4 Steps to Decrease the Risk of Malicious Insider Activity

By Veriato - October 02, 2017

4 Steps to Decrease the Risk of Malicious Insider Activity

Our CSO, David Green, has a new whitepaper out.  Here he addresses some practical things you can do to improve your organizational ability to detect insider threats before they become insider attacks, react quickly and with confidence to potential (or actual) problems, and in doing so increase the security of you intellectual property and confidential information.

David blends years of experience with insights gained from working closely with our customers.  It's a great read, and an excellent resource.

"The risk of malicious activity has never been more of a reality for organizations. End users today access, process, and manage privileged data more than ever as part of their job. This need for employees to use privileged data puts the organization at risk of malicious actions that include data theft, destruction, manipulation, and ransom. And it’s not just theory, a full one third of reported insider incidents in 2015 involved end users who access sensitive data as a requirement to do their jobs .

This raises the question of why a seemingly loyal employee would turn and even contemplate stealing data, let alone take action. Approximately half of insider incidents have a financial motive1 . There are plenty of buyers of credit card data, social security numbers, and healthcare data – all with per-record market rates ranging from one cent to well over $1,000. Additionally, organizations with intellectual property and trade secrets are also at risk of insider espionage, which has increased as the primary motive from less than 5% of attacks in 2009 to 25% in 2015."

Read More


We promise that we won't SPAM you.