The biggest threat to your company’s data and network is sitting beside you
Advertisement
If you ask entrepreneurs what's the greatest threat to their company's network and data, they may state, "viruses, hackers and cyber criminals," or maybe "faulty hardware, software and system failures". But the truth is—the biggest threat to your company is probably your employees .
In the 2016Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters included malicious intent, and one-quarter included accidental actors.
What can they really do?
With so much critical data and operations tied up in a company's network, internal damage from employees turns into a significantly greater risk. In a matter of minutes, an employee can delete software or erase years of data vital to a company. They can intentionally download viruses or endeavour to tarnish their boss' reputation by posting erotic entertainment on their company's website or spamming all clients with racist, hateful and offensive emails. Alternately they can essentially download client lists and other confidential information and sell it to competitors, post it online or utilize it to start a competitive business.
Cyber criminals are experts at hijacking identities. Some accomplish this by compromising an employee system through malware or phishing attacks; some leverage stolen credentials, particularly by gleaning data from social networks. Much of the time attackers can expand a hacked user's access within a system, driving them to significantly more sensitive information.
What can you do?
Understanding the users who hold the potential for most noteworthy damage is critical. Tending to the security risks that these people represent, and the critical assets they access, should be a priority. Specifically, monitor IT admins, executives, key vendors, and at-risk employees with greater vigilance.
So when you read the following scurrilous headline about some breach by an external hacker, remember that these attacks account for less than half of the breaches out there. Furthermore, remember that the hacker likely used the identity of a clueless employee to pull it off. Make a move to ensure your association isn't the one in these headlines.
Advertisement
In the 2016
What can they really do?
With so much critical data and operations tied up in a company's network, internal damage from employees turns into a significantly greater risk. In a matter of minutes, an employee can delete software or erase years of data vital to a company. They can intentionally download viruses or endeavour to tarnish their boss' reputation by posting erotic entertainment on their company's website or spamming all clients with racist, hateful and offensive emails. Alternately they can essentially download client lists and other confidential information and sell it to competitors, post it online or utilize it to start a competitive business.
Cyber criminals are experts at hijacking identities. Some accomplish this by compromising an employee system through malware or phishing attacks; some leverage stolen credentials, particularly by gleaning data from social networks. Much of the time attackers can expand a hacked user's access within a system, driving them to significantly more sensitive information.
Advertisement
Understanding the users who hold the potential for most noteworthy damage is critical. Tending to the security risks that these people represent, and the critical assets they access, should be a priority. Specifically, monitor IT admins, executives, key vendors, and at-risk employees with greater vigilance.
So when you read the following scurrilous headline about some breach by an external hacker, remember that these attacks account for less than half of the breaches out there. Furthermore, remember that the hacker likely used the identity of a clueless employee to pull it off. Make a move to ensure your association isn't the one in these headlines.
Advertisement
- A centenarian who starts her day with gentle exercise and loves walks shares 5 longevity tips, including staying single
- A couple accidentally shipped their cat in an Amazon return package. It arrived safely 6 days later, hundreds of miles away.
- Colon cancer rates are rising in young people. If you have two symptoms you should get a colonoscopy, a GI oncologist says.
- Having an regional accent can be bad for your interviews, especially an Indian one: study
- Dirty laundry? Major clothing companies like Zara and H&M under scrutiny for allegedly fuelling deforestation in Brazil
- 5 Best places to visit near Darjeeling
- Climate change could become main driver of biodiversity decline by mid-century: Study
- RBI initiates transition plan: Small finance banks to ascend to universal banking status
- JNK India IPO allotment date
- JioCinema New Plans
- Realme Narzo 70 Launched
- Apple Let Loose event
- Elon Musk Apology
- RIL cash flows
- Charlie Munger
- Feedbank IPO allotment
- Tata IPO allotment
- Most generous retirement plans
- Broadcom lays off
- Cibil Score vs Cibil Report
- Birla and Bajaj in top Richest
- Nestle Sept 2023 report
- India Equity Market