Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors
Stephen Nardone - Director of Security Solutions and Services

The Threat Among Us

What to Include in Your Insider Threat Programs

|

Not all employees and third party vendors are potential threats, but having a program in place to detect and respond to insider threats will strengthen security and protect an organization’s assets.

287674_TheThreatAmongUs_Nardone_MediumIn reality, every organization should function with the assumption that every employee and partner is a “potential” threat.  This might sound harsh, but here’s why. If a company assumes that none of the people who come into contact with their critical data, or even a portion of the people, could do damage, then they are immediately vulnerable. In my professional opinion, every information security program should be based around the fact that everyone is a potential threat. Period. Then build policies and monitor with that understanding in mind.

According to IBM’s recent analysis of cyber-attacks and incident data breaches caused by insiders are both malicious and unintentional.  The report notes that over 95% of insider breaches are caused by human error, which means that employees accidentally share confidential information to the wrong party via email, fax, or mail, or improperly disposing of clients’ records.

In contrast to those that accidentally compromise security, there are those with malicious intent who flout policies and find ways to circumvent access controls without regard for consequences.

Designing an insider threat program with these key components in mind with help enterprises better detect insider threats and quickly recover from any incidents.

  • Create a clear and formalized policy that is continuously updated with full and frequent corporate-wide participation
  • Identify the leadership parties responsible for oversight of the program which should include insider threat awareness training programs
  • Include procedures for confidentially reporting suspicious behaviors
  • Utilize technical data and behavior analytics that detect anomalies
  • Determine clear procedures for responding to and communicating about insider threat

As a Champion of National Cyber Security Awareness Month (NCSAM) 2016, Connection is committed to promoting cyber security and online safety. Our in-house team of security experts is dedicated to helping organizations of every size reduce their risk with industry-leading security solutions and services. Connection’s Security Practice can help create comprehensive security programs that leverage the latest technologies from our partners.

Our team is proud to support the goals of NCSAM:

  • Promote online safety
  • Ensure everyone has the resources to stay safer and more secure online
  • Engage and educate public and private sector partners through events and initiatives with the goal of raising cyber security awareness 



For more than 30 years, the Connection family of companies has been trusted to provide and transform technology into complete solutions. For more information, drop us a line.