Over Half of Data Security Incidents Caused by Insiders
The security vendor commissioned Forrester to interview over 150 security and IT professionals in the region as part of a wider study: Insider Threats Drive Data Protection Improvements.
It found that insider threats caused 59% of incidents impacting sensitive data in the past 12 months. This follows a previous Imperva analysis of the most significant breaches of the past five years, which revealed a quarter (24%) were caused by human error or compromised credentials.
World Backup Day: How Insider Threats Intersect with Data Backup and Best Practices for Insider Risk Management
World Backup Day is a great time to review the basics of backing up data, and looking ahead to 2022, insider risk management is one key area to focus on when it comes to data backup. A backup is an additional copy of data and can include an array of corporate information like emails, messages, or even employee photos. Data backup is often used as a precaution in case there is loss, destruction or corruption of the original copy. As such, many organizations prioritize backing up data and view it as a worthwhile practice. However, there are some new things enterprises should consider when it comes to backing up corporate data in today’s digital and distributed workplace.
Today we sat down with Armaan Mahbod, Director of Security and Business Intelligence, Counter-Inside Threat here at DTEX Systems, to discuss best practices for insider risk management in the context of data backup and how workforce cyber intelligence can protect against insider risks and threats.
Drawing the RedLine – Insider Threats in Cybersecurity
Insider threats are some of the most dangerous and effective threats, primarily because they cannot be eliminated as risks. They exist within the target network, typically as users that have current access to resources within the network.
A common misrepresentation of the insider threat is of a malicious user, such as a disgruntled employee. Though this is a type of insider threat, it is not the only one: even the most well-meaning and careful of users (including security staff!) can become insider threats. While attack vectors are typically seen as unpatched servers or vulnerable applications, insider threats are a very common attack vector.
The Sedona Conference Issues Commentary on Protecting Trade Secrets Throughout the Employment Life Cycle
The Sedona Conference, Working Group 12 on Trade Secrets, has issued guidance on protecting trade secrets throughout the employment life cycle. This significant Commentary analyzes the tension between an employer’s interest in protecting its trade secrets and an employee’s interest in engaging in future employment.
Trade Secrets and Patents: A Great IP Combo
Trade secrets or patents? This is oftentimes seen as a choice that you must make. Do I file a patent and get federal protection, or do I try to keep the invention secret?
It is not as simple to say — trade secret or patent. In fact, trade secrets and patents can work together to ensure companies the broadest possible protection — and increase your company’s value. Trade secrets and patents provide different forms of protection and protect different types of information. A patent has a term of 20 years, while protection for a trade secret can last indefinitely. A patent gives you the exclusive right to prevent others from commercially exploiting the invention during the life of the patent. This is provided in exchange for the full disclosure of the invention. A trade secret, on the other hand, is not disclosed, and therefore can last indefinitely so long as certain steps are taken to ensure the secrecy of the trade secret.
It’s Time to Consider Whether You’re Adequately Protecting Your Intellectual Property with Trade Secrets: The News in Russia Shows Us Why
Earlier this month, the Russian government issued a decree stating it will use patented products from so-called “unfriendly countries” without compensating owners. The law already allows the state to authorize taking and using IP rights in cases of “emergency” or a threat to national security. But now, the government is taking this one step further by moving toward creating compulsory licenses for certain technologies.
These authoritarian measures are leading U.S.-based companies to suspend their products and services in Russia. Tik Tok and Netflix are recent examples, as are Apple and Google, both of whom recently blocked access to their applications in Russia.