Insiders in organizations can – indeed, have been – responsible for more security breaches than employers would like to acknowledge. This, an observation by Jai Vijayan on the DarkReading site, ought to be giving managers pause, and reason for sharpening their organizational safeguards.
“The key to dealing with insider threats,” Vijayan writes, “is to keep an eye on all those accessing your most sensitive data in a way that does not intrude on privacy.”
He quotes Christy Wyatt, CEO of Dtex Systems, as noting that “There are many critical behavior red flags that you can look for in order to accurately and quickly pinpoint insider threats,” Wyatt says. “Three of the major red flags we see are data exfiltration, obfuscation, and bypassing security measures.”
Citing Wyatt and others, Vijayan provides “six signs that an insider has gone rogue or is headed that way.”