Insider Threats: 10 Ways To Protect Your Data - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // Digital Business
News
11/18/2015
07:06 AM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail

Insider Threats: 10 Ways To Protect Your Data

While IT focuses on outside threats, danger lurks from within -- your employees. Whether intentional or unintentional, data breaches resulting from workers mishandling data can be prevented. Here's a look at 10 ways it can be done effectively.
6 of 12

Baseline Computing Behavior Of Employees
Data loss through intentional or unintentional behavior often occurs when users access information they don't commonly work with. The key to stopping this is to alert IT security when abnormal employee behavior on corporate resources is happening. In order to establish when behavior is abnormal, baselining normal behavior is the first step here. The practice is known as user and entity behavior analytics (UEBA).  
(Image: ClkerFreeVectorImages via Pixabay)

Baseline Computing Behavior Of Employees

Data loss through intentional or unintentional behavior often occurs when users access information they don't commonly work with. The key to stopping this is to alert IT security when abnormal employee behavior on corporate resources is happening. In order to establish when behavior is abnormal, baselining normal behavior is the first step here. The practice is known as user and entity behavior analytics (UEBA).

(Image: ClkerFreeVectorImages via Pixabay)

6 of 12
Comment  | 
Print  | 
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Remote Work Tops SF, NYC for Most High-Paying Job Openings
Jessica Davis, Senior Editor, Enterprise Apps,  7/20/2021
Slideshows
Blockchain Gets Real Across Industries
Lisa Morgan, Freelance Writer,  7/22/2021
Commentary
Seeking a Competitive Edge vs. Chasing Savings in the Cloud
Joao-Pierre S. Ruth, Senior Writer,  7/19/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Monitoring Critical Cloud Workloads Report
In this report, our experts will discuss how to advance your ability to monitor critical workloads as they move about the various cloud platforms in your company.
Slideshows
Flash Poll