E-Waste Security

  • Home
  • Services
    • Certificate of Destruction
    • Hard Drive Destruction Service
    • IT Asset Disposition
    • Computer Recycling
  • Privacy Laws
    • NIST 800-88
    • FTC Fines
    • HIPAA Security Standards
    • HIPAA Compliant
  • Hard Drive Destruction
    • NAID Certified
    • HIPAA Data Destruction
  • About Us
    • Articles
  • Contact Us
Home
|
Articles
|
News
|
Insiders Big Threat to Intellectual Property

Insiders Big Threat to Intellectual Property

October 12, 2016 News
0

Insiders in All Shapes, Forms There are “all sorts of insiders,” Baker said, noting that the incidents could have been by malicious insiders, former employees, insiders coerced by outsiders, or even honest mistakes. Employees may need the money, making them willing accomplices when approached by outsiders, or angry enough to lash out at the company, Baker said.

Mistakes cover a whole range, such as forgetting to change or disable the default password, neglecting to encrypt sensitive data, and accidentally posting sensitive data to a public server. There were many instances of former employees going back into systems and causing damage because their accounts had not been revoked after they left the company, Baker said.

In fact, “misuse” was the top-most used threat action in IP theft. Verizon classifies attack methods in seven categories, and the overall DBIR found that most data breaches were the result of malware or hacking. In cases of IP theft, it was more likely that the thieves were users who already had access to the data or systems.

Privileged accounts are often not managed properly, and in many cases have weak passwords or are shared between multiple users, Adam Bosnian, an executive vice-president at Cyber-Ark, told SecurityWatch. “Businesses across industries need to wake up and understand that these privileged accounts are the number one target,” Bosnian said, adding that controlling these access points “needs to be a priority.”

In fact, Cyber-Ark found that 43 percent of businesses in its 6th annual global IT security survey, released in June, did not monitor how privileged accounts were being used despite being aware that attackers are increasingly taking advantage of these accounts, Bosnian said.

To understand trends surrounding intellectual property theft, Verizon analyzed 85 incidents from the 2012 DBIR and 2011 DBIR, Baker said. The sheer number of data breaches involving IP theft means anything related to insider attacks “gets drowned out” in the DBIR, making this kind of a spotlight valuable, Baker said.

  • Facebook
  • Twitter
  • Google+
  • LinkedIn
Inadequate IT disposal can lead to security leaks
2020 Tokyo Olympics will recycle e-waste into gold medals

Related Posts

  • The FTC is Watching Your Hard Drive Destruction and IT Disposal Practices
    December 7, 2017
  • Computer Recycling Process Flow
      Computer recycling and data destruction process flow for easy an easy decision process.
    October 30, 2017
Free Quote
Hard Drive Shredding
https://youtu.be/6n9x_ifudNI

Los Angeles
1730 E. Holly Ave
El Segundo, CA 90245
(424) 217-7900
info@ewastesecurity.com

5405 Wilshire Blvd # 302
Los Angeles, CA 90036
(323) 677-2502
info@ewastesecurity.com
Orange County
8 Whatney
Irvine, CA 92618
(949) 514-8090
info@ewastesecurity.com
Santa Clara, County
97 S. Second St. Suite 100 - #251
San Jose, CA 95113
(650) 450-9956
info@ewastesecurity.com

  • Facebook
  • Twitter
  • Google +
  • Youtube
E-Waste Security