Insider Threats are increasing due to BYOD trend!

2224

A recently conducted ‘Insider Threat’ survey by DTex confirms that BYOD explosion is helping threat landscape increase in organizations across the United States. The security vendor also confirmed in its report that nearly half or 48% of the 400 IT pros participating in the survey have confirmed that detecting and mitigating insider threats is becoming next to impossible to IT Security teams.

Researchers at Dtex claim that most insider threats occur due to sheer negligence from organizations and not from determined employees. And the survey cites inadvertent data breach/compromise as a top insider concern.

Christy Wyatt, the CEO of DTex Systems claims that humans are the weakest link for organizations as businesses struggle to pinpoint ways to detect the moment when an insider becomes a threat to an organization.

She added that employee training protocols, malware detection tools, antivirus platforms and SIEMS practically lack context in detecting insider vulnerabilities.

A SANS Institute study released earlier this month ranked malicious insider threat as more damaging than accidental or negligent staff. The report also confirmed that BYOD was acting as a driving force to increase insider threats.

So, what the best way to deal with the situation…?

End user training is termed as the best way to mitigate the risk of insider threats while using BYOD. This can be done by smartly leveraging the increasing mobile force with all basic security protocols while connecting mobile devices to corporate networks.

Note- Insider threat is nothing but a malicious threat coming from people working in an organization. Here the word ‘People’ can refer to current employees, past employees, contractors, business associates and in some cases from customers who somehow grab information related to an organization’s security practices, data and computer systems.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display