Skip to content

Menu

  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL

Archives

  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • December 2020
  • October 2020

Calendar

June 2025
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
30 
« Jun    

Categories

  • Android
  • Antivirus
  • Artificial Intelligence (AI)
  • Automobili
  • Bitcoins
  • Blockchain
  • CAREER
  • Cloud Computing
  • Cybersecurity
  • DEVELOPMENT
  • Digital Transformation
  • EDUCATION
  • FINANCE
  • HEALTHCARE
  • Home Security Systems
  • IGAMING
  • Internet of Things (IoT)
  • Laptops
  • NEWS
  • Printers
  • PRODUCTS
  • RETAIL
  • Routers
  • SECURITY
  • Servers
  • SERVICE
  • Smartwatches
  • Storage
  • Streaming Devices
  • SUSTAINABILITY

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress

HOT
  • Why are multiwallet apps useful?
  • Why are virtual credit cards useful?
  • Crypto-crash: why did it happen?
  • Where to study blockchain?
  • What would happen if Bitcoin became worth zero dollars?
logo itechnews
  • HOME
  • NEWS
    • Android
    • Artificial Intelligence (AI)
    • Cloud Computing
    • Digital Transformation
    • Internet of Things (IoT)
  • PRODUCTS
    • Desktops
    • Home Security Systems
    • Laptops
    • Printers
    • Routers
    • Servers
    • Smartwatches
    • Storage
    • Streaming Devices
  • SECURITY
    • Antivirus
    • Cybersecurity
  • FINANCE
  • HEALTHCARE
  • SUSTAINABILITY
  • DEVELOPMENT
  • EDUCATION
  • CAREER
  • RETAIL
  • You are here :
  • Home
  • SECURITY ,
  • Cybersecurity
  • The insider threat: understanding human behavior that impacts cyber-resilience
The insider threat: understanding human behavior that impacts cyber-resilience
May 20, 2022

The insider threat: understanding human behavior that impacts cyber-resilience

SECURITY . Cybersecurity Article

When a cyberattack occurs, it’s easy to point fingers at users who may have caused it, albeit inadvertently, but these accusations are toxic and counterproductive.

Instead, it is better to delve into what are the human behaviors that cause that cybersecurity incident. In fact, according to the latest studies, systems would not necessarily be safer without users: people can be an important ally, especially with proper training.

How to account for human behavior

If one reads research on electronic fraud (phishing), one finds that approximately 10% of users will be victims of this type of attack. This is a good example of a case where people’s behavior needs to be taken into account. If your strategy hinges on trusting employees not to follow links or open attachments, even though the latter is crucial in areas like recruiting, then you realize how important it is to have a resiliency strategy.

The strategy should therefore ensure that if a user becomes a security vulnerability, you can prevent, detect, or at least mitigate malicious activity.

Design of user-centered security systems

Users are generally not cybersecurity experts, so asking them to make decisions between ‘everything is fine’ or ‘the company is on fire’ simply by clicking on one or two options is probably not going to work at all. well.

That’s when user-centric security design becomes effective. Simply put, this is where process flow, user experience, and day-to-day operations need to be considered.

New insider threat management models

Managing the risk of an insider threat depends, above all, on how robust Identity and Access Management (IAM) is, along with behavioral monitoring to identify suspicious or outright malicious behavior.
However, this management should not focus only on the people who use the system. With more and more interactions between machines, and therefore between applications, it is equally essential to consider them part of the overall solution.

That is why we no longer only talk about User Behavior Analysis (UBA), but User and Entity Behavior Analysis (UEBA).

You may also like

Google Cybersecurity Centre of Excellence to Open in Spain’s Sunny Southern Coast

The Latest Developments in AI, Machine Learning, and Cybersecurity

UK Government Looking to Potentially Ban Chinese Hikvision Cameras

Tags: Cybersecurity, phishing

Categories

  • Android (3)
  • Antivirus (1)
  • Artificial Intelligence (AI) (20)
  • Automobili (6)
  • Bitcoins (6)
  • Blockchain (8)
  • CAREER (18)
  • Cloud Computing (15)
  • Cybersecurity (28)
  • DEVELOPMENT (20)
  • Digital Transformation (62)
  • EDUCATION (20)
  • FINANCE (99)
  • HEALTHCARE (98)
  • Home Security Systems (2)
  • IGAMING (12)
  • Internet of Things (IoT) (28)
  • Laptops (8)
  • NEWS (351)
  • Printers (2)
  • PRODUCTS (90)
  • RETAIL (31)
  • Routers (8)
  • SECURITY (60)
  • Servers (13)
  • SERVICE (12)
  • Smartwatches (2)
  • Storage (2)
  • Streaming Devices (13)
  • SUSTAINABILITY (56)
  • Contact
  • Pressrelease
  • Newsletter sign up
  • IT Media Group
    • IT-KANALEN.SE
    • IT-KANALEN.DK
    • IT-RETAIL.SE
    • IT-FINANS.SE
    • IT-KARRIÄR.SE
    • IT-HÅLLBARHET.SE
    • IT-PEDAGOGEN.SE
    • IT-HÄLSA.SE
    • IT-TECHNEWS.COM ENGLISH

Copyright IT-Technews 2025 | Theme by ThemeinProgress | Proudly powered by WordPress