It’s no secret that insider threats pose a huge risk to organizations globally, but studies show that very little is being done to protect against this threat.

New SANS Institute research revealed that that 40% of respondent’s rate malicious insiders are the most dangerous threat their organization could face, followed by accidental or negligent staff members (36%).

While over 60% claimed their organization had yet to fall victim to an insider attack, report author Eric Cole feels this number is very misleading.

“It is important to note that 38% of the respondents said they do not have effective ways to detect insider attacks, meaning the real problem may be that organizations are not properly detecting insider threats, not that they are not happening,” Cole claims.

Cole further explained that end users are now seen as “the entry point of choice” for malicious attackers, meaning your own employees could pose the largest threat to your organization.

Only 18% claim to have incident response plans developed with provisions in place for insider threats, but it is important to note that 49% are currently developing such programs for their organization.

The SANS 2016 Threat Landscape Survey found that 48% of attacks bypassed endpoint defenses through user error, and 38% through social engineering tactics.

Employees being ‘over privileged’, in terms of rights and permissions and access to roam networks and steal company data, is one of the biggest vulnerabilities found within an organization. Organizations must ensure that access controls are being strictly enforced and that they have a solution within the IT environment to detect the presence of malware and make sure hardening measures are in place.  



Read this article on InfoSecurity Magazine






The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.