Insider Threats Facing SMBs: Are You the Highest Risk to Your Business?

You’ve been doing an excellent job so far getting your business off the ground and managing it. Seems like there is always something new that must be kept up with. In this case we’re talking about cyber security, specifically insider threats. Numerous experts and reports all indicate that insider threats still remain a top cyber security challenge, year over year. This means even if you have the best security suite protecting you from outside attackers, someone inside your company can be your greatest threat; including yourself! When it comes to insider threat no one poses a greater threat to the company than unaware or uncommitted owners.

Insider Threats Facing SMBs: Are You the Highest Risk to Your Business?

Insider Threat Awareness & Best Practices

First let’s dispel the popular myth that hackers only go after larger targets and that small businesses are not relevant. This is false. When it comes to data, hackers do not discriminate. What’s important to these thieves is not the size of the business but the data it holds. While you may have even purchased a security suite, technology alone is not a solution to insider threat; as phishing incidents often demonstrate. The act of phishing which is simply tricking people into providing sensitive information with deceptive tactics, can bypass all security measures to keep insiders out. Having an up-to- date awareness about insider threats can do a lot to prevent these situations. Below are some of the cost-effective practices that you as a small business owner can implement. >> Continue reading on Small Biz Daily.

Isaac Kohen

Isaac Kohen

Isaac Kohen started out in quantitative finance by programming trading algorithms at a major hedge fund. His time spent in the financial world and exposure to highly sensitive information triggered his curiosity for IT security. He worked as an IT security consultant for several years where he spearheaded efforts to secure the IT infrastructure of companies with masses of confidential data. When Isaac first entered the industry, IT norms were to prohibit and lock out as many people as possible to protect data. He found that this was a very ineffective way of solving the issue because it made it hard for many people who wanted to cause no harm, to do their jobs. He decided to focus on algorithms targeting user behavior to find outliers within the companies he consulted with to help detect insider threats.Isaac can be contacted at ikohen@teramind.co

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *