BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Hacker Popularity Overshadows Insider Attacks

Post by Peter McCalister August 2, 2011

Anonymous and LulzSec attacks have been making a splash across news headlines this summer. It should come as no surprise that hacker attacks are far more publicized than insider attacks. In fact, according to the 2011 CyberSecurity Watch Survey conducted by CSO Magazine and Deloitte, 70 percent of insider incidents are handled internally without legal action.

This begs the question – how many of those incidents are disclosed to the public? While a majority of U.S. states have enacted security breach notification laws it hasn’t stopped some organizations from covering up insider breaches.

Security breach notification, whether from a hacker or an inside attack, doesn’t just fall on private organizations. The California Department of Public Health took 80 days to disclose that an employee was improperly copying information over a period of fours years to a private hard drive. And just last week the Treasury Inspector General for Administration released a report indicating that the IRS averages 86 days to report issues where personal information has been compromised.

Currently legislation is making its way through the House of Representatives, aptly titled, Secure and Fortify Electronics (SAFE) Data Act, that if enacted would preempt state data breach disclosure laws and require companies to notify the FTC and affected individuals within 48 hours.

Although many businesses focus much of their security technology budgets toward protecting themselves against breaches from outsiders, it’s also as critical that they implement privileged identity management solutions to securing their perimeters within from insider threats.

Leave a Reply

Additional articles

smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,
BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,