Download PDF version Contact company

The people out in cyberspace that invade users' privacy are usually the ones users prepare to protect themselves from. Still, what if those people weren’t the only threats to be wary of?

According to a recent report from Forrester, this is the case more often than users think. Insider threats at security firms caused 59% of data security incidents over the last year, typically consisting of accounts being misused by internal employees or business associates, resulting in data leaks that would-be online criminals are looking to take advantage of.

Data leak risks

With this in mind, why does it appear to be so common among cybersecurity firms? The most likely reason is that a staggering 70% of EMEA organisations have little to no risk strategies set in place to prevent insider data leaks.

Suppose insider risk is such a prominent issue in the cybersecurity industry. Why are companies failing to take action against this problem? According to Forrester, around 39% of organisations experiencing trouble with insider data leaks cited a lack of budget, and 38% cited a lack of internal expertise as the reason behind insider risks in their organisations.

Manual monitoring

Some organisations aren’t taking the risk of insider data leaks as seriously as they probably should

In addition to this, 29% claimed that they do not see employees of the company as a significant threat to their company’s data, making it a bit easier to speculate why the number of organisations without a risk strategy is as high.

ACRE has identified the problem: some organisations aren’t taking the risk of insider data leaks as seriously as they probably should, but what can we do to fix this? According to a report from Forrester, 65% of respondents cited staff training as a solution, 50% cited manual monitoring of employee activity, and 47% cited improved encryption as a potential tactic to quell insider risk.

Importance of education

ACRE understands the importance of education in the cybersecurity industry, not only for customers looking to protect themselves online but also for employees in the industry.

By adequately educating employees and training them to manage accounts accordingly, ACRE can ensure that it remains among the cybersecurity firms with insider risk strategies that exceed expectations.

Physical and cybersecurity convergence

Convergence also allows data sharing and unified growth of security best practices across security departments

The idea of physical and cybersecurity convergence is not new and has been a discussion amongst industry leaders for many years.

It's been proven that organisations with combined physical and cybersecurity operations are better prepared and more robust, enabling them to easily define risks, prevent, mitigate, and respond to threats plaguing the organisation. Convergence also allows data sharing and unified growth of security best practices across security departments.

User awareness and detection

Cybersecurity needs to be at the forefront to stop attacks like phishing or false authentication, and mitigate threats.

Upwards of 90% of cybersecurity incidents are not a result of IT infrastructure weaknesses, such as weak firewall policies, but, a result of a lack of employee cyber security awareness, resulting in people making ill-informed decisions in their day-to-day activities, and ultimately facilitating a security incident.

Cybersecurity solutions

Best practices include encouraging employees to view cybersecurity as a necessity for themselves

Best practices in an organisation include encouraging employees to view cybersecurity as a necessity for themselves and the organisation. Suppose the heads of the organisation care deeply about these policies.

In that case, it will lead to a better overall organisational culture, and utilising cyber security solutions while promoting best practices will become the norm across the organisation.

Multifactor authentication

Individuals simply assigning or attempting to create passwords with letters, numbers, or characters is no longer a sustainable security option for most devices. Those seeking harm will try to crack passwords with highly sophisticated programmes and have been known to use all types of brute-force attacks to get what they want.

Multifactor authentication is vital in this day in age, and its importance is not spoken about enough. Even if it can cause a bit of a setback, the amount of security it provides is well worth the minor inconvenience of two or three logins. 

Download PDF version Download PDF version

In case you missed it

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP
Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP

A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a b...

Quick poll
Which feature is most important in a video surveillance system?