Friday, 6 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Innovations > Rising to the challenge of insider threats
Innovations

Rising to the challenge of insider threats

Last updated: February 10, 2024 4:21 pm
Published February 10, 2024
Share
insider threats
SHARE

According to a Cybersecurity Insiders report, the average cost of an insider threat incident in 2023 is $15.38m. However, there are tell-tale indicators that your firm could be at risk from an insider threat, argues Chris Denbigh-White, CSO at Next DLP.

For a company to be able to handle risk effectively, complete visibility of its entire security environment is essential. That means not only protecting data and networks against external threats but also assessing risks that come from within the business: a primary vulnerability which brings its own specific challenges.

In fact, the risks posed by internal threats have grown to near-omnipresent levels, with recent industry research indicating that 74% of organisations say insider attacks have become more frequent.

The challenge is in identifying where these threats come from, as employees and contractors all have variable levels of authorised access. This challenge is clearly proven with stats illustrating that over half of companies have reported an insider threat. It is particularly difficult to address as whilst threats can indeed be the result of malice, in many cases they are simply down to human error.

Asking the right questions

The first questions to address are: “Why?”, “Where are these threats coming from?”, and “What is the motivation behind them?” Negligence has been found to account for almost two-thirds of insider incidents, showing that further strategy around dealing with insider threats could be a quick and easy solution to this threat. Security lapses that are caused negligently or accidentally could arise from a lack of training or compromised credentials, among other easy-to-fix problems.

See also  CIOs recalibrate IT agendas to make room for rising AI spend

These types of incidents have many causes, such as an authorised user breaching security protocols to do their job more quickly or effectively. On the other hand, malicious insider threats are motivated by anything from playing politics, financial incentives, or simply spite of a soon-to-be-ex-employer or employee.

Spotting insider threats from afar

There are several identifying factors within your security environment to be aware of when it comes to insider threats. Identifying unusual or out-of-character behaviour can help limit or prevent the fallout from a security breach, whether it is intentional or accidental.

These warning signals may encompass various elements, such as employees accessing systems during unconventional hours, displaying frequent and irregular absences from work, facing financial challenges, or engaging in constantly challenging behaviour with colleagues. While these indicators are highly subtle and challenging to identify, there are also more conspicuous warning signs, such as an employee consistently seeking elevated privileges or attempting to access resources beyond their remit.

In many cases, identifying these pointers is easier said than done. Unsurprisingly, employees intent on acting in bad grace will try to cover up suspicious behaviour to throw their colleagues off the scent, which is why organisations need advanced analytics to highlight subtle changes in activity against baseline normal expectations. Such a system can then alert the relevant security personnel to anomalous behaviour that demands investigation.

To comprehensively mitigate risks at the organisational level, a holistic and proactive approach is essential. Conducting routine risk assessments and security audits, for instance, serves as a robust framework for developing an efficient insider threat strategy. Their primary advantage lies in their ability to pinpoint current vulnerabilities in security posture and processes, allowing for their timely closure before being exploited by a malicious or negligent insider.

See also  Is your cloud network ready to embrace it?
© shutterstock/Thapana_Studio

Introducing advanced technological threat intelligence

The human element will always be critical. However, there are also evolving tools based on AI and Machine Learning which are promising to change the game when it comes to threat detection. These cutting-edge technologies can predict and identify anomalies more quickly and more accurately, providing an extra level of advanced security. At the same time, they integrate with existing security systems to help address external and internal threats in a timelier manner.

In particular, organisations are increasingly adopting a variety of technological solutions, including Data Loss Prevention (DLP), which harnesses threat intelligence and advanced analytics to detect a wider spectrum of insider threats. These tools are designed to act pre-emptively, identifying potential threats before they escalate into security incidents or breaches.

Additionally, they use automation technologies to intervene in malicious or negligent activities within organisational infrastructure, such as preventing users from downloading sensitive data to removable storage, automatically encrypting data within emails, or conducting real-time content inspections to thwart unauthorised exfiltration.

Security professionals rely on identifying the root causes of insider threats by reconstructing patterns and analysing employee behaviour via the granular analysis of data. All of this should also be contextualised through applications, connected devices and behavioural patterns while ensuring that employee privacy and confidentiality are maintained.

The importance of training and employee engagement

Technology has a vital role to play in supporting a strong security strategy. However, employees have their own role to play, and it requires consistent and robust training programmes. Such training will ensure that they can grasp why they are not allowed to perform certain actions, what constitutes a breach of security and what the right course of action is.

See also  At the two-year mark, UAVs have changed the face of war in Ukraine—but not outcomes

Equipped with this knowledge, employees can build upon it on an ongoing basis when it comes to best practices, thus providing a substantial extra layer of proactive protection against accidental breaches.

Insider threats can only be adequately addressed by combining technology, training, and corporate culture. Encouraging an environment based on trust and security awareness, in tandem with advanced technology, will safeguard reputation, employees and assets, alike.

Source link

TAGGED: challenge, insider, rising, threats
Share This Article
Twitter Email Copy Link Print
Previous Article Stability, Midjourney, Runway hit back hard in AI art lawsuit Stability, Midjourney, Runway hit back hard in AI art lawsuit
Next Article 7 Key Advantages Of Hybrid Data Centers 7 Key Advantages Of Hybrid Data Centers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

VividQ Raises $7.5M in Additional Series A Funding

VividQ, a Cambridge, UK-based deep expertise innovator in computational holography, closed a further $7.5m Sequence…

August 23, 2024

Study claims OpenAI trains AI models on copyrighted data

A brand new research from the AI Disclosures Project has raised questions concerning the information…

April 4, 2025

Innovatium secures strategic investment to accelerate PRISMA technology deployment

Scottish clear tech pioneer Innovatium Restricted has attracted very important funding from Hitachi Industrial Tools…

July 15, 2025

IBM opens first quantum computing center in Europe

New alternatives to develop options The opening was attended by a number of high-level representatives…

October 4, 2024

Amazon pours $150B into data centers to handle expected AI boom

Amazon is reportedly planning to spend a whopping $150 billion throughout the subsequent 15 years…

March 28, 2024

You Might Also Like

High-performance large language models for Europe
Innovations

High-performance large language models for Europe

By saad
An Estonian large language model for sovereign AI infrastructure
Innovations

An Estonian large language model for sovereign AI infrastructure

By saad
Livermore Computing: Accelerating excellence in HPC
Innovations

Livermore Computing: Accelerating excellence in HPC

By saad
European defence
Innovations

Inside the EU’s military innovation push

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.