Skip to content

Menu

  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • December 2020
  • October 2020

Calendar

May 2025
MTWTFSS
 1234
567891011
12131415161718
19202122232425
262728293031 
« Jun    

Categories

  • Android
  • Antivirus
  • Artificial Intelligence (AI)
  • Automobili
  • Bitcoins
  • Blockchain
  • CAREER
  • Cloud Computing
  • Cybersecurity
  • DEVELOPMENT
  • Digital Transformation
  • EDUCATION
  • FINANCE
  • HEALTHCARE
  • Home Security Systems
  • IGAMING
  • Internet of Things (IoT)
  • Laptops
  • NEWS
  • Printers
  • PRODUCTS
  • RETAIL
  • Routers
  • SECURITY
  • Servers
  • SERVICE
  • Smartwatches
  • Storage
  • Streaming Devices
  • SUSTAINABILITY

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress

HOT
  • Why are multiwallet apps useful?
  • Why are virtual credit cards useful?
  • Crypto-crash: why did it happen?
  • Where to study blockchain?
  • What would happen if Bitcoin became worth zero dollars?
logo itechnews
  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL
  • You are here :
  • Home
  • SECURITY ,
  • Cybersecurity
  • Internal attacks on companies have grown by 31% in the last three years
Internal attacks on companies have grown by 31% in the last three years
May 25, 2022

Internal attacks on companies have grown by 31% in the last three years

SECURITY . Cybersecurity Article

The damage caused by internal attacks on the information systems of companies in the US grew by 31% in the last three years, with an average cost of more than 11 million dollars, according to the 2020 Cost study of Insider Threats Global.

There was also a 47% increase in the frequency of incidents that, on average, take 77 days to contain. Of the three main profiles – negligent users, infiltrators and credential thieves – the latter are the ones that cause the most damage, although they only represent a quarter of the attacks.

To help curb this emerging threat, AUTELSI has prepared a paper that analyzes this problem, which has served as the basis for the meeting “Internal Cybersecurity Threats: Insiders ” in which Mikel Salazar Peña, Head of Cybersecurity for Iberia at DXC Technology , presented a roadmap and best practices and technologies to combat insiders .

Telecommuting has exponentially increased risk due to the use of insecure connections, the use of personal devices and the blurring of the perimeter, problems that add to the already complicated threat landscape of the pre-pandemic.

For Mikel Salazar Peña, in the battle against the ‘ insiders ‘ it is necessary to focus on three key principles. The first is Reduce complexity. Identify and understand the risk to which organizations are exposed, having a clear starting maturity level and entry vectors. In addition to compliance with regulations, it is essential to have a plan prepared in case the organization is compromised and to have reputational and operational impact management protocols.

The second is Protect the data. “We have to change the chip, before the focus was on securing the network, now the urgent thing is to pay attention to data and identity. We recommend the implementation of the Zero Trust model where any user or element is a potential threat, regardless of whether it is internal or external. Thanks to Zero Trust we will have a reinforced authentication, verification processes and improvement in the visibility of the use of the data in a transversal way”, declared Mikel Salazar.

Its implementation requires strong authentication (supported by multifactor and conditional access solutions), in a reliable device (free of vulnerabilities and with advanced EDR response systems). It will also be essential to ensure the principle of least privilege. In the case of verification, it will be essential to incorporate User and Entity Behavior Analysis (UEBA) systems supported by artificial intelligence and machine learning for the advanced detection of this type of ‘ insiders ‘.

The third focus is to place Security at the center. The employee is the first line of defense and a good training and awareness plan that includes reinforced policies, security updates and continuous training is essential. At a corporate level, it is essential to sponsor the management, creating a culture of security, applying the principle of the ” secure ” principle. by design ”.

You may also like

Google Cybersecurity Centre of Excellence to Open in Spain’s Sunny Southern Coast

The Latest Developments in AI, Machine Learning, and Cybersecurity

UK Government Looking to Potentially Ban Chinese Hikvision Cameras

Tags: cyber-attack, Cybersecurity

Categories

  • Android (3)
  • Antivirus (1)
  • Artificial Intelligence (AI) (20)
  • Automobili (6)
  • Bitcoins (6)
  • Blockchain (8)
  • CAREER (18)
  • Cloud Computing (15)
  • Cybersecurity (28)
  • DEVELOPMENT (20)
  • Digital Transformation (62)
  • EDUCATION (20)
  • FINANCE (99)
  • HEALTHCARE (98)
  • Home Security Systems (2)
  • IGAMING (12)
  • Internet of Things (IoT) (28)
  • Laptops (8)
  • NEWS (351)
  • Printers (2)
  • PRODUCTS (90)
  • RETAIL (31)
  • Routers (8)
  • SECURITY (60)
  • Servers (13)
  • SERVICE (12)
  • Smartwatches (2)
  • Storage (2)
  • Streaming Devices (13)
  • SUSTAINABILITY (56)
  • Contact
  • Pressrelease
  • Newsletter sign up
  • IT Media Group
    • IT-KANALEN.SE
    • IT-KANALEN.DK
    • IT-RETAIL.SE
    • IT-FINANS.SE
    • IT-KARRIÄR.SE
    • IT-HÅLLBARHET.SE
    • IT-PEDAGOGEN.SE
    • IT-HÄLSA.SE
    • IT-TECHNEWS.COM ENGLISH

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress