In many cases, they look, act, speak and dress like every other company employee. Contrary to belief, today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders, both malicious insiders and negligent insiders.
Increasingly, global enterprises are responding to insider threat actors with established mitigation programs. According to the 2018 Insider Threat report by Cybersecurity Insiders, the vast majority (86 percent) of organizations already have or are building an insider threat program. Thirty-six percent have a formal program in place to respond to insider attacks, while 50 percent are focused on developing their program. They are employing Data Loss Prevention (DLP), encryption, and identity and access management solutions. To better detect active insider threats, companies also deploy Intrusion Detection Prevention Solutions (IDPS), log management and SIEM platforms, the report says.