Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

The Top Cyber Threat to Your Network comes from Inside Your Firewall

by Peter Jacobs
April 26, 2019
in Cybersecurity
Reading Time: 3 mins read
A A
cyber threat
Share on FacebookShare on Twitter

Hackers, cybercriminals, and nation-states all present real, measurable risks to your systems and data. But the leading cyber threat continues to be insider threats. According to numerous studies, people on the inside of an organization or government agency are the source of the greatest risks. By some accounts, insider threats can cost an organization millions of dollars. Plus, it can take months to contain the impact of an insider breach, if you detect it at all.

Greatest among these threats are careless or non-malicious insiders; that is, those who inadvertently allow access to secure systems and data. In fact, industry surveys show that the majority of security breaches stem from carelessness on the part of employees or contractors. Seemingly harmless actions— something as simple as clicking on a link in an email or leaving a screen open on a desktop before heading out to lunch—can allow bad actors access to the network.

Learn About Insider Threats

Additionally, contractors should be limited in what systems they can access, but if those systems have a way to connect to others across the network, your security could be compromised. Over the past few years, a number of high-profile breaches were traced to contractors having access to seemingly innocuous systems, such as HVAC controls, that tied into the enterprise network.

Naturally, agencies are on heightened alert for malicious insiders – disgruntled employees or those working with criminals or foreign entities to compromise or steal data. With intellectual property, state secrets, and the personal information of all U.S. citizens on the line, identifying and blocking cyber assaults is critical, but made harder when insiders are involved, either by choice or unwittingly.

In a webinar coming up on May 2, 2019, Matt Shelton, Director of Technology Risk and Threat Intelligence at FireEye, will take a deep dive into the risks posed by insider threats, including which systems may be most at risk. He’ll also discuss how to identify a threat from the inside as well as practical steps you can take today to secure your organization’s systems and data.

The insider threat to government systems is growing rapidly. While agencies have made a lot of progress in fighting cyber threats, the battle lines keep shifting. More education is needed to engage employees in becoming more vigilant. At the same time, the right technology can help, if it’s applied appropriately. The critical thing for CISOs and employees throughout an organization is to commit to taking action.

Reserve Your Spot 5/2 11am EST

Tags: Biggest Security Risk for GovernmentContractor BreachContractors Security Riskcyber threatsCybersecurity WebinarIdentifying Insider ThreatsInsider ThreatsInsider Threats for Federal GovernmentMatt SheltonTop Cyber Threats for Government

RELATED POSTS

threat to agencies
Cybersecurity

A Growing Threat to Agencies: Ransomware Reshapes the Cyber Security Landscape

December 8, 2020
insider threats
Civilian

Managing Insider Threats Should be a Top Priority for 2021

December 1, 2020
Cost of Insider threats
Civilian

The Rising Cost of Insider Threats Affects Agencies Ability to Deliver on the Mission

November 13, 2020

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5387 shares
    Share 2155 Tweet 1347
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    87 shares
    Share 35 Tweet 22
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us