Access and Feeds

Security: Risk from Insider Threats Continue to Grow

By Dick Weisinger

Insider threats are malicious activities that originate from people within an organization that have direct access to software and hardware systems, like current employees, former employees, contractors and business associates.

Remote work and greater use of company-external tools like messaging apps, transfer services and cloud apps are making work more efficient for employees but they are also adding significant risk to the security of the data that they have access to. A survey by Code42 on Risk Threats found that 37 percent of employees frequently rely on unauthorized cloud apps to share enterprise data and collaborate.

The Code42 report found that:

  • 85 percent of employees are more likely to leak files than pre-COVID.
  • More than half of IT security leaders expect insider threats to only increase
  • More than half of organizations have no insider threat response plan
Insider Data Risks. from the Code42 Report

Joe Payne, president and CEO at Code42, said that “Insider Risk affects every organization. It is a byproduct of employees getting their work done everyday – how they create, access and share files in today’s collaboration culture. However, security teams are at a disadvantage: there is a lack of understanding of Insider Risk, which is leading to complacency, failing technologies and inadequate processes. The severity of the Insider Risk problem is being consistently overlooked, evidenced by the sharp rise in risky behavior this year. Our findings show that organizations are not even measuring the efficacy of their Insider Risk mitigation programs. Inattention to Insider Risk Management will threaten the future of the digital enterprise.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *


five × two =