Skip to main content

You have a ‘super malicious insider’

There’s a super malicious insider who is technically proficient and often acutely aware of an organisation’s technical limitations in proactively detecting insider threats. This is according to Dtex System’s 2022 Insider Risk Report that is based on real investigations and data collected by the Dtex Insider Intelligence and Investigations (i3) team throughout 2021.

 The super malicious insider is a technically proficient employee who is acutely aware of an organisation’s cybersecurity architecture, solutions and processes and who understands both the technical and human analyst limitations in detecting insider threat indicators.

The report identifies a significant increase in industrial espionage incidents and the rise of the ‘Super Malicious Insider’ persona and provides evidence that the abrupt shift to remote work has directly contributed to an escalation in psychosocial human behaviours that create organisational risk.

These ‘super malicious’ insiders have the technical skills needed to bypass many defences and often the training (usually provided by their employers) to understand how traditional cybersecurity solutions identify threats (i.e. data loss prevention, user activity monitoring, firewalls, virtual private networks and IAM).

Read more …You have a ‘super malicious insider’

  • Hits: 784

Securing your estate’s technology

Securing your estates technologyCybersecurity is one of those topics that has been in the media and in almost every print and online publication, even in verticals that have nothing to do with cybersecurity, for years. Today it’s one of those topics that we gloss over or perhaps don’t even see unless the headline is catchy or mentions a company we know.

Another reason for this ‘boredom’ with cybersecurity is that the so-called solutions always seem to be the same, but the breaches and problems never go away. There is always another major company losing large sums of money and millions of personal details and these are mainly in the US or EU because the law compels these companies to spill the beans. In Africa there is no telling how much of our personal information has been lost as it is only recently that companies have been required to admit a breach. At the same time, we know how important following the law is in this country and we know how law enforcement struggles to keep up.

Read more …Securing your estate’s technology

  • Hits: 857

How smart are smart homes really

Connected consumer and business products have begun flooding the market, but security remains an afterthought. Cybercriminals are always on the prowl to access smart devices like wireless security cameras, smart TVs, baby cameras, smart speakers, smartphones or tablets.

johnThe plethora of connected gadgets introduced to homes over the past decade has opened new doors for cybercriminals. Every connected gadget increases the risk of being hacked and not having a firewall is the same as leaving the house door wide open.

Higher levels of security are a necessity in a connected age, where our cars, homes and money are all connected and controlled by computers and IoT devices. The stakes are also much higher now with hackers attacking not only our bank accounts, but our cars and homes too.

Consumers need to figure out how to secure these connected things.

Read more …How smart are smart homes really

  • Hits: 880

Protecting your workforce

The workforce is any organisation's greatest asset but also its biggest risk. It has never been more important to protect employees from exploitation by external attackers, while also limiting the risk that they pose as trusted insiders.

The erosion of the cyber-perimeter and accelerated shift to virtual workforce models necessitate a new approach that baselines activities and behaviours and protects employees by highlighting anomalies. More importantly, employees have the right to know that personal activities and behaviours that don't directly increase organisational risk, cause cultural conflict, or limit successful operations, remain private and anonymous.

Read more …Protecting your workforce

  • Hits: 1083

Insider threat detection for security and compliance

In today’s modern and distributed enterprise, it’s more difficult than ever to proactively combat internal and external threats due to a lack of server visibility in the context of user behaviour, application updates and system configuration changes. Insider threat detection for security and compliance

This lack of visibility into data access, usage, modification, movement, upgrades and IP connections creates gaps in ‘intent’ awareness and fails to identify abnormalities that signal increasing risk, such as application deployments, administrative changes and new users.

Business leaders need to rethink server visibility, detection and protection, especially considering the recent attacks on both businesses and the technology platforms they run. In virtually every successful attack there were obvious abnormal superuser account activities, anomalous file downloads and changes in packaged software processes. These attacks all offered ‘indicators of intent’ that should have triggered elevated risk scores and immediate investigative action.

Read more …Insider threat detection for security and compliance

  • Hits: 941