Organizations with 20–100 employees.
Organizations with 100+ employees with an internal IT team.
Elevity is one of the largest and most capable technology management providers in the Midwest. Our team of technology experts can help you reach a truly elevated level of IT strategy, security, solutions and support.
NEXT EVENT: March 21
FEATURED RESOURCE
2675 Research Park Drive
Madison, WI 53711
Organizations with 20–100 employees.
Organizations with 100+ employees with an internal IT team.
Elevity is one of the largest and most capable technology management providers in the Midwest. Our team of technology experts can help you reach a truly elevated level of IT strategy, security, solutions and support.
NEXT EVENT: March 21
FEATURED RESOURCE
2675 Research Park Drive
Madison, WI 53711
There’s a saying that goes, “Cybersecurity would be easy if it weren’t for the employees.” Whether due to negligence, ignorance, or outright malice, insider attacks are a massive cybersecurity concern.
Remember Dennis from Jurassic Park?
You’ve seen the stats and heard the horror stories. But what should you DO about it? Here are some of the most important actions you can start taking today to protect against insider threats based on the 2019 Verizon Insider Threat Report.
Accounts with special access and permissions (like admin accounts) need extra protection.
Restrict and monitor access to critical parts of your network, including network devices, servers, and workstations, as well as key accounts, applications, and files.
Also, determine what is “normal” user behavior and network activity – then monitor and review logs for events that don’t fit the norm.
In addition:
MFA authenticates users with two or more independent forms of identification. You should require it for VPN remote connections to the corporate environment. MFA should also be set up for accessing email from external sources.
Whether you issue smartphones to employees or let them use their own, more and more corporate data is being accessed via mobile.
When an employee leaves the company, IMMEDIATELY terminate their access by:
Security awareness training should be the cornerstone of your insider threat prevention strategy. Your training program should:
Training should start on the employee’s very first day as part of their onboarding. Conduct refresher training and assessments throughout the year.
If all else fails and you experience a successful insider attack, do you know what to do? That’s why you need an incident response (IR) plan.
The plan should include processes for the six IR phases:
In addition, draft a communication plan detailing how and when IT should inform the appropriate stakeholders about insider incidents.
What we’ve covered here is a good start, but there’s a lot more a company can do to protect itself from insider threats.
Partnering with an experienced cybersecurity firm like Elevity can help you ensure you’ve covered all the bases – while taking some of the burden off your shoulders.
Let’s talk! Visit our Security page or contact us.
8 Ways to Spot an Insider Threat (Dark Reading)
How to Protect Your Organization Against Insider Threats (TechRepublic)
Cybersecurity Regulations: 10 Ways to Encourage Employee Compliance (Forbes)
2675 Research Park Drive
Madison, WI 53711
888.733.4060
support@elevityit.com
A Division Of