Dealing With Insider Risk Starts Before They're An Insider
By Veriato - January 02, 2017
Quick question: does your company have a 'one size fits all' approach to screening perspective hires?
The answer is (I hope) 'of course not.' Depending on the position being filled, companies apply different levels of scrutiny. When hiring a new CFO, for example, one can reasonably expect more rounds of interviewing and a more stringent background check than when hiring an entry-level bookkeeper.
What you are doing in your hiring process is appropriately setting risk levels by position. You may not have a formal matrix of every position in your company with a corresponding risk level ' but you should.
We background check, interview, and check references ' all to help us decide if we can trust. If we determine a candidate is trustworthy (and, of course, qualified) we make an offer, and if all goes well, bring them onboard.
Unfortunately, the constant drumbeat of insider driven fraud, theft, leaks, etc., serves as an ever-present reminder that trust is not a viable security strategy. So, we should first look at each position and determine, based on the level of access to critical information and/or information systems, how much risk the company has should the position holder ' the insider ' go rogue. It can be as simple as a 1-10 scale.
Next, we should insure that, for positions with greater risk, we are monitoring the activity of the insider more closely than for positions with less risk. There are numerous ways to monitor employee activity ' here at SpectorSoft we are obviously partial to our approach. But regardless of how you do so, if you are serious about mitigating insider risk, detecting and preventing insider threats, and generally insuring the security of your most critical data and systems, assigning risk levels and aligning monitoring profiles to them is a great first step.
5 Tips to Choose the Best Internet Monitoring SoftwareNovember 18, 2019
6 Reasons Computer Monitoring can improve Employee ProductivityOctober 25, 2019
- Cyber & Data Security
- Employee Monitoring Software
- Insider Threat Detection & Prevention
- Data Loss & Theft Prevention
- User Behavior Analytics
- Ransomware Prevention and Detection
- User Activity Monitoring
- Artificial Intelligence - AI
- Forensic & Employee Investigations
- Machine Learning
- Cyber Security Awareness Month
- higher education