Scroll through daily news feeds and it won’t take long before you spot a story about an insider threat heist. Here’s a couple of major headlines that are hard to forget:
Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found
— The Washington Post
Twitter VIP account hack highlights the danger of insider threats
Anthony Levandowski, former Google engineer at center of Waymo-Uber case, charged with stealing trade secrets
The reality is if major enterprises like Google and Twitter, and the CIA, an organization that arguably should operate under the strictest of security standards, can be breached from the inside, so can any company, including yours.
These scenarios aren’t flukes. Research backs up what we see in the news. Insiders are involved in two-thirds of breaches. And they aren’t slowing down. Insider threats are on the rise, with incidents jumping 47% over two years. Yet, companies are only investing 10% of their security budgets on internal threats.
This rising tide of insider threats has set the backdrop for our new book, Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can’t Ignore. Just released, it digs into the problem of insider threats — what’s driving them and what companies can do to keep their workforces productive and their data safe.
The problem? The potential for data leaks has never been greater, because taking data has never been easier. Think about it. Workforces are more distributed than ever before. Data is moving off corporate networks and collaborative tech is paving the way. Security teams are trying to keep up — but they can’t protect what they can’t see.
The solution? Inside Jobs is a call to action for companies to change their approach to data security. Modern day security can no longer be accomplished by “Big Brother” forms of monitoring or traditional prevention solutions that rely solely on classification and blocking systems. The new world of data security assumes positive intent; creates organizational transparency, increases security awareness through ongoing training and requires new technology.
I invite you to browse through the book yourself. To make it easy, you can start reading the first chapter now or make a purchase wherever books and ebooks are sold, like Amazon. Whether you are a business or security leader or a member of the c-suite, our book will have some practical advice for you. You might even have an “aha moment” – that moment when you realize what data is leaving your organization and how it’s happening.
Get more insights into Inside Jobs in our upcoming blog series. Members of the c-suite will discuss the important role they play as change agents in building a healthy security culture.