Quantcast
Channel: Insider threat – Netwrix Blog | Insights for Cybersecurity and IT Pros
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Privilege Abuse: Threat Alert

Talking with IT pros, I hear a lot about security issues, and one story is extremely common. The details vary, but at the core is the same threat: privilege account abuse or misuse. In this post, I’ll...

View Article



Image may be NSFW.
Clik here to view.

How to Mitigate the Risk of Employee Data Theft

Picture your IT infrastructure as a castle where your highly critical data resides. Just a few years ago, to defend those “crown jewels,” you could simply build a moat around the perimeter of the...

View Article

Top 5 Reasons Why Departing Employees Can Be a Security Nightmare

Employees taking sensitive company information with them when they leave their jobs might seem like the stuff of nightmares, but it’s actually a common true horror story. Biscom’s research, for...

View Article

Image may be NSFW.
Clik here to view.

Key Lessons Learned from Data Breaches Caused by Privilege Abuse

In a previous blog post, “Privilege Abuse: Threat Alert,” we provided an overview of what privilege abuse is and why this threat is so serious. In today’s post, we will look at the problem from a...

View Article

Hot Tips: How to Harden Privileged Account Security

Privileged accounts are user accounts with extended permissions to access systems and data, such as the root account in Unix and Administrator accounts in Windows. Sometimes they are called “the keys...

View Article


7 Tips to Avoid Data Theft by Ex-Employees

By Pierre Dehombreux, Director of Information Technology, Whiteriver Unified School District Disabling the user accounts of fired employees right after their dismissal does not guarantee they won’t...

View Article

Insider Threat Detection: 10 Techniques for Top-to-Bottom Defense

In a recent post, How to Mitigate the Risk of Employee Data Theft, we looked at employee data theft as one of the top insider threats that can jeopardize your organization’s cyber and information...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Reduce the Risk of Employee Theft of Confidential Information

Departing employees can be a big source of data leakage for organizations; in fact, there are at least 5 reasons why departing employees can be a real pain. So we need to take a closer look into how to...

View Article


Let Us Close the Awareness-Action Gap in Cyber Security Together

Persuading non-IT personnel to respect information security policies and report on incidents has always been a challenge. Unfortunately, new research shows that there is still no cooperation between...

View Article


Image may be NSFW.
Clik here to view.

Who Is to Blame for a Data Breach? Answers to the Most Pressing Questions

The Netwrix 2018 IT Risks Report presents new research into the security threats organizations are facing and the actions they are taking to minimize IT risks. The report explores six IT risks:...

View Article

Understanding Insider Threats: Definition and Examples

This post first appeared on blog.netwrix.com and was written by Elena Vodopyan.Insider threats remain one of the biggest issues plaguing cybersecurity. A study by Ponemon shows that the costs of...

View Article

Insider Threat Detection

This post first appeared on blog.netwrix.com and was written by Dirk Schrader.Insider threat incidents have increased by 44% over the past two years, and the cost of an incident now tops $15.3 million,...

View Article

Employee Data Theft: How to Mitigate the Risk

This post first appeared on blog.netwrix.com and was written by Michael Ustinov.Picture your IT infrastructure as a castle that houses your most critical data. Just a few years ago, the best way to...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images