Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 June, 2022
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Securonix Insider Threat Report:

Employees or contractors identified as “flight risks” account for 60% of security incidents

by Joel
May 21, 2020
in Data Protection, Hacking, Research, Security News
Angry employee
Share on FacebookShare on Twitter

A brand-new Insider Threat Report authored by Shareth Ben, director of insider threat and cyber threat analytics at Securonix has found that employees deemed “flight risks” are linked to around 60% of the insider threat incidents detected. Ben explained in the report that flight risks are those employees about to terminate employment with the company for various reasons and can be determined by Securonix’s advanced user behaviour analytics.

The Securonix Threat Research Team analysed hundreds of incidents across several industry verticals to expose the various types of behaviours that have been observed in the field and the detection techniques that have worked to detect such behaviours.

The report found that the exfiltration of sensitive data continues to be the most common insider threat caused by employees and contractors, followed by privileged account abuse.

And the exfiltration of that sensitive data happens most often over email, followed by web uploads to cloud storage sites, such as Dropbox etc.

Furthermore, the circumvention of IT controls is prevalent across all organisations and account sharing continues to be a huge problem for organisations, resulting in compliance, security hygiene issues, and, in some severe cases, leading to account compromise.

Also of note is that the work from home situation due to the recent COVID-19 pandemic has exacerbated the problem pertaining to data leaving the enterprise perimeter, which, Ben says, continues to become more porous.

The full report can be viewed here: https://www.securonix.com/resources/insider-threat-report-may-2020/

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Home Chef Announces Data Breach

Next Post

Corelight Co-founders Receive Prestigious IEEE Test of Time Award

Recent News

European Cybersecurity Blogger Awards 2022 Winners Announced

European Cybersecurity Blogger Awards 2022 Winners Announced

June 29, 2022
Phone with white background

The Top Mobile Security Threats of 2022

June 29, 2022
Two computer screens filled with code. Shadowed figure.

Evilnum Hackers Return With New Activity Targeting International Migration Campaigns

June 29, 2022
1 in 6 Enterprise Endpoints exposed to identity risks

Appointment of four new executives ignites Illusive’s international expansion

June 29, 2022

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2021
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information