Insider Threats: 10 Ways To Protect Your Data - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // Digital Business
News
11/18/2015
07:06 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Insider Threats: 10 Ways To Protect Your Data

While IT focuses on outside threats, danger lurks from within -- your employees. Whether intentional or unintentional, data breaches resulting from workers mishandling data can be prevented. Here's a look at 10 ways it can be done effectively.
Previous
1 of 12
Next

(Image: succo via Pixabay)

(Image: succo via Pixabay)

With so much attention placed on protecting corporate infrastructure from external threats, it often comes as a surprise to IT leadership that over 40% of data loss is the direct result of internal threats. While we must generally think of our employees as trusted individuals, their mishandling of data -- both intentional and unintentional -- is a tremendous risk in the world of IT security.

The situation is not helped by the changing ways workers are interacting with and handling data. The Bring Your Own Device (BYOD) movement has made employees lives much easier, now that they can perform work duties in ways that before were difficult and in places previously unreachable. But at the same time, BYOD has also introduced far more ways for data to leak out of IT's protective hands.

As a result, IT administrators must begin to think more seriously about internal machine-to-machine transactions -- and how they pose as much of a threat of data loss as employees do. The Internet of Things (IoT) will undoubtedly increase the risk of machine-account theft and usage. Adding to the risk is the fact that machine-account security standards are far less secure when compared with employee user accounts.

[Read 14 Security Fails That Cost Executives Their Jobs.]

Needless to say, simply preaching about employee education and patch management won't quite cut it in today's ever-growing problem of data loss, which, along with associated downtime, costs enterprise organizations around the world $1.7 trillion a year. IT security, with IT leadership championing the effort, must move well beyond the basics.

The following pages present 10 different ways your organization can help reduce the risk of internal data breaches. Most enterprises have likely implemented one or more of these security practices. But there might be some methods listed that many may not have thought of or seriously considered.

Take a look and tell us what you think of our list. Are there other data security measures that your organization uses? Let us know in the comments section below.

Andrew has well over a decade of enterprise networking under his belt through his consulting practice, which specializes in enterprise network architectures and datacenter build-outs and prior experience at organizations such as State Farm Insurance, United Airlines and the ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 12
Next
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Slideshows
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Commentary
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
Slideshows
Flash Poll