Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Agencies Must Take Action to Combat Insider Threats

by Jackie Davis
April 18, 2019
in Cybersecurity
Reading Time: 3 mins read
A A
Insider threats
Share on FacebookShare on Twitter

When the discussion of cybersecurity begins, it is usually focused on foreign threats and attacks like ransomware and malware, but there is something even more dangerous lurking in the shadows: insider threats. These threats come from within an agency, and while not always malicious, they are always dangerous to data security. The number of insider threats has steadily increased as workforces migrate to digital and cloud technologies. How can government agencies combat these threats? Read on to learn more.

Insider Threats on the Rise

According to a recent survey from the cybersecurity firm Bitglass, 73 percent of IT professionals believe that insider threats are becoming more frequent. Over 59 percent said their organizations had at least one insider attack in the past year. As the workplace becomes more digital, it’s important for devices and cloud applications to be secured against both outside and inside threats.

“Insider attacks are harder to identify and remediate than those that originate from outside the enterprise,” said Rich Campagna, CMO of Bitglass. “If organizations want to prevent insider attacks, they have to address these security gaps.”

Read more here.

How to Neutralize Insider Threats

According to the Verizon Insider Threat Report, there are five insider threat personas that could cause an agency serious harm. These include the careless worker, the inside agent, the malicious insider, the disgruntled employee, and the feckless third party. All these personas can pose great risk to agencies, which is why it is becoming increasingly important for IT professionals to educate themselves.

“Indicators of risky insider behavior can include factors such as attempts to access information outside of normal job functions, working late hours for no required work reason, or concealing foreign contacts, travels or financial connections,” said John Grim, Verizon Threat Research Advisory Center, Investigative Response Team.

Read more here.

Ex-NSA Director on Insider Threats

Ret. Admiral Michael Rogers, former head of the National Security Agency, weighed in on how to handle the risk of insider threats and protect an organization’s data.

“No. 1: Who has access to what data; what [access do they] need? That’s very important,” said Rogers. “And No. 2, understanding your population. For us in the government – at the NSA – it was uniform military, [civilians], and contractors. We had to build a strategy for three distinct populations in the workforce that sometimes operate with slightly different rules, slightly different responsibilities. What works for one doesn’t necessarily work for the other.”

Read more here.

Interested in learning more about insider threats? Subscribe today.

Tags: BitglasscybersecurityInsider ThreatsmalwareMichael RogersNational Security AgencyNSARansomwareSecurityVerizonVerizon Insider Threat Report

RELATED POSTS

Design Secure Application Software That Transforms Government Agencies
Civilian

Design Secure Application Software That Transforms Government Agencies

June 28, 2022
Healthcare
Civilian

Delivering on the Next-Gen Healthcare

June 23, 2022
Contributed Articles

DMARC: A Critical Tool for State and Local Government Cybersecurity

June 21, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5386 shares
    Share 2154 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us