Cybersecurity Policies Must Address Internal Threats

Education

Cybersecurity Policies

The contentious U.S. election campaign offered up many highlights, but the aftermath of election night – explosive cyberattack allegations – provided even more intrigue.

These weren’t run-of-the-mill allegations, either. In fact, U.S. intelligence officials at the CIA and FBI were adamant that Russia was behind cyberattacks during the U.S. election that were targeted against the Democratic party – part of a bid to hurt Hillary Clinton’s presidential hopes and to help get Donald Trump into the White House.

Whether Russian involvement helped Trump to become leader of the free world — Russian President Vladimir Putin has scoffed at the allegations — is up for debate. But what is certain is that cybersecurity risks are serious business – and companies need to be aware both of the risks and of how to prevent them. Successful attacks, after all, can cripple corporate networks, decimate bottom lines, and damage reputations among customers and suppliers.

It’s easy sometimes to assume that all the threats come from outside of organizations, but it’s important to understand that the real threats come from within because cyber criminals are more and more shifting their focus to attacking corporations from the inside rather than from the outside to potentially evade detection.

Yes, workers, can possibly present serious threats to security. What follows, therefore, are some tips on safeguarding businesses from the potential inside threats.

  1. Education is Key

Education is critical if businesses want to reduce the risks of cyberattacks that lead to damaging data breaches. Verizon’s 2016 Data Breach Investigations Report notes that a whopping 63% of confirmed data breach incidents were the result of weak, default or stolen passwords. The report adds that cyber criminals, employing social engineering techniques, still have little trouble convincing people click on links that lead to pages requesting personal information. For Instance, the 2016 report shows that 30% of phishing messages were opened compared to 23% in 2014 — and 12% of targets ended up opening the malicious attachments or clicking on the links versus 11% in 2014. What this means is that businesses have to educate their workers so that these workers don’t become the weak links that end up compromising their networks.

  1. Manage Access

Businesses that put in place solid identity and access management policies can lessen the odds of being victimized by cyberattacks since they will be able to govern which employees have access to what information. Robust policies will help businesses to validate workers’ identities, which will then provide employees with access to only the amount of information — sensitive or otherwise — that they need to do their jobs. It’s also important that businesses monitor the online behavior of their employees. This is particularly important when it comes to accessing information that could potentially be used for financial gain, and there needs to be a clear process for revoking access right away if necessary.

  1. Mobile Considerations

In an age when many employees use mobile devices — both company-issued and personal — it’s critical that businesses not only recognize the potential threats, but also address these threats with appropriate actions. According to one source, 61% of workers use their mobile devices both for work-related purposes and for personal purposes, but many of these same workers don’t get training for how to properly use their mobile devices. The 2016 Data Breach Investigations Report, meanwhile, notes that security incidents are often caused by workers who, for instance, lose their laptops or mobile devices. It adds that 39% of theft occurs in victims’ work spaces and 34% occurs in workers’ personal vehicles. So companies need clear policies to ensure that workers understand how to safely use their mobile devices.

The threats facing corporations in this digital age are very real as cyber criminals get more and more resourceful when it comes to finding ways to access corporate networks. While it’s important for businesses to be wary of external threats that could lead to data breaches, it’s also important for them to be mindful of the internal threats when working on cybersecurity policies. This means engaging their employees so that they don’t become the weak links.

By Ian Palmer

Amazon's Varies Revenue Segments

Amazon’s Varies Revenue Segments

Amazon Revenue Amazon has become the largest retailer worldwide, however it is projected to make up less than 5% of U.S. retail sales by the end of 2020. While most people are already familiar with ...
DSP

How DSPs Can Proactively Improve Broadband Performance Issues by 45%?

DSPs Can Proactively Improve Broadband Performance 67% of customers who contact their Digital Service Provider’s (DSP’s) customer service report broadband issues. Around 26% of customers report inconsistent internet speed causing work from home issues during ...
AI and ML: Key Drivers to Building a Resilient Business

AI and ML: Key Drivers to Building a Resilient Business

The future is here. It’s 2021 and it’s already time for businesses to ready themselves for the new decade. The previous year has shown us that you have to be prepared for both expected and ...
Ronald van Loon

How Do You Choose The Right Data Career Path?

Choosing The Right Data Career Path I am a firm believer that data is shaping the world around us and so I constantly strive to drive awareness about the value of data and how it ...
Scott Leatherman

Speeding up Digital Transformation During the Pandemic – 7 Steps to Unlocking the Benefits of Cloud

7 Steps to Unlocking the Benefits of Cloud The pressure for IT leaders to support more workloads and remote staff with limited resources is as contagious as the pandemic. The most powerful tool in their ...