Insider Threats

insider spy

06 Jun How to detect an Insider Spy

An insider spy is perhaps the most significant threat to enterprise security. Monitoring their behavior is a critical component in detecting and deterring their activities. Some years ago the Chinese government sent Chi Mak to the United States to obtain employment in the defense industry with the goal of stealing US defense secrets, which he did for over 20 years. Among...

Read More
Fort Friday Security Clips

20 May Fort Friday Security Clips— Flight 804, TeslaCrypt, Cyber-espionage Malware Discovered

EgyptAir Flight 804: No hard evidence yet Early Thursday morning EgyptAir Flight 804 was cruising normally beneath clear skies on a flight from Paris to Cairo, then suddenly lurched from left to right (issuing no distress signal) and plummeted 38,000 feet—disappearing  into the Mediterranean Sea. Egyptian authorities, some Russian officials and aviation experts say downed flight 804 may have been an act of...

Read More
cybersecurity apathy in the meeting room

11 May Cybersecurity Apathy – A misunderstood or bound for failure endeavor

Between all the firewalls, malware protection, threat intelligence, insider threat protection, IDS/IPS, managed security, certification and accreditation, and biometrics, why in the world are system owners still getting crushed? One word, apathy. When we look at the definition of the word, it is almost ironic if it were not so problematic. noun lack of interest, enthusiasm, or concern. synonyms: indifference, lack of interest, lack...

Read More
Top 10 Ways to spot a phishing atttack

04 May Top 10 Ways to Spot a Phishing Expedition

The FTC defines phishing as "Internet fraudsters who impersonate a business to trick you into giving out your personal information." How to Spot a Phishing attack I continue to be amazed at the number and sophistication of phishing attacks. The just released 2016 Verizon Data Breach Investigations Report indicates that stolen user credentials continue to be the most common method cybercriminals use...

Read More
ransomware is like shackles on your data

03 May RANSOMWARE —It’s like VISA—It’s everywhere you want to be

Since the start of 2016, Ransomware has been making all the headlines.  Unlike a traditional break in and pilfer of data, ransomware renders a victim’s computer system(s) utterly useless unless a “ransom”, in BitCoins is paid.  When we think of a hacker trying to earn a buck taking on “the man”, we generally think about FORTUNE 500 companies or the...

Read More
2016 year of ransomware

02 May 2016—The Year of Ransomware

Earlier last month, several police departments in Lincoln County Maine was attacked with Ransomware. That’s pretty bold since law enforcement generally does not pay ransom. They are the guys that are supposed to stop folks from having to pay extortion money. Ransomware has been around since 2005, but we’ve seen a significant escalation in recent years, starting in 2012 and continuing through...

Read More
insider threat

27 Apr Insider Threats versus Insider Threat Intelligence

Earlier today, I was exposed to a great piece of technology.  In the interest of this not looking like an advertorial, let’s just call it the Acme Project (AP).  So many technologies are advancing today that advise they provide insider threat protection.  Regardless if you are creating policies or leveraging algorithms that look for anomalous behavior, you have some really...

Read More
insider threat security gates

26 Apr Insider Threat Security Gates—Wide Open

Lacking insider threat security? When an employee departs—will she or he have the ability to use prior credentials after termination? Recently, A U.S. federal court in Wisconsin ordered Indian IT provider: Tata Consultancies (TCS), to pay Epic Systems $940 million in damages. Why? Because an employee was using credentials from a previous contracting job to access Epic's Web portal, whereby this portal contained...

Read More
insider threat is like a volcano

25 Apr The Honest Truth to Insider Threat Security

Nobody wants to think they have an insider threat problem. But in any group you have at least one person that's bound to drag you all down with them. Whether by accident, on purpose, through ignorance, or just bad luck—they will cause some sort of trouble that ends in bad things effecting you all. If you don't see that in your...

Read More
insider threats trend du jour

24 Mar Insider threats — Trend Du Jour

We've all heard that users can be a companies weakest link—whether deliberate or through negligence—employees (and ex-employees) are increasingly creating security risks within their organizations. With insider threats rapidly becoming the trend du jour—companies need to amp up vigilance. You also have to consider ex-insiders who may go rogue. In the recent Ofcom breach, an  ex-employee went rogue and handed over approximately six...

Read More