BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

People are Less Forgiving of Insider Threats than Outside Hacks

Posted April 6, 2012    Peter McCalister

A new study says that people are more likely to file a lawsuit against a company that experienced a data breach if that breach was the result of unauthorized disclosure or disposal of data than if the breach happened due to an outside hack. The study, titled Empirical Analysis of Data Breach Litigation, says “plaintiffs respond more to the careless or negligent handling by a firm of their personal information than to a firm’s inability to withstand a cyber-attack.”

As this research indicates, people are less tolerant or forgiving of missteps or carelessness with the handling of sensitive information internally, which should be a red flag to any company that has yet to institute identity and access management policies. Human nature is capricious and mistakes are inevitable – it’s unfortunate, but because these are indisputable characteristics of people companies are liable for taking the proper precautions to protect sensitive data.

The study also showed the chance of a lawsuit was 9.7 percent higher if the breach exposed financial information, while breaches involving social security numbers were negatively correlated with lawsuits, though the effect was relatively small at 2.4 percent. Any medical data or credit card data had no effect on the probability of litigation.

Regardless of what type of information your company has, be it sensitive customer data, or your own intellectual property, having the right insider threat protection policies can be the difference between forgiveness and a lawsuit.

Leave a Reply

Additional articles

CyberResiliency

6 things I like about Gartner’s Cyber Resiliency Strategy

Posted August 27, 2015    Nigel Hedges

There were 6 key principles, or recommendations, that Gartner suggested were important drivers towards a great cyber resiliency posture. I commented more than once during the conference that many of these things were not new. They are all important recommendations that are best when placed together and given to senior management and the board – a critical element of organisations that desperately need to “get it”.

Tags:
,
powerbroker-difference-1

Why Customers Choose PowerBroker: Flexible Deployment Options

Posted August 26, 2015    Scott Lang

BeyondTrust commissioned a study of our customer base in early 2015 to determine how we are different from other alternatives in the market. What we learned was that there were six key differentiators that separate BeyondTrust from other solution providers in the market. We call it the PowerBroker difference,

Tags:
, ,
Mac-Security-Enterprise

On Demand Webinar: Security Risk of Mac OS X in the Enterprise

Posted August 20, 2015    BeyondTrust Software

In the last several years, Mac administrators have come to realize that they may be just as vulnerable to exploits and malware as most other operating systems. New malware and adware is released all the time, and there have been serious vulnerabilities patched by Apple in the past several years, some of which may afford attackers full control of your systems.

Tags:
, ,