Industry News
5 Best Practices to Prevent Insider Threats in 2019
Data breaches caused by insiders cost enterprises millions of dollars. According to the Ponemon Institute, every year, companies lose up to $8.7 million due to insider threats. To ensure an appropriate level of enterprise data protection, security officers continuously look for ways to improve their current insider threat management solution. With the following insider threat management best practices, you’ll be able to protect your sensitive business information and keep malicious insiders at bay.
1. Consider access controls
It’s essential to keep your critical assets inaccessible for malicious insiders. First and foremost, deploy multi-factor authentication (MFA) for the most valuable systems, applications, and services. Your goal is to make sure that any malicious insider won’t be able to borrow a password from their colleagues and get a hold of the data they aren’t supposed to have access to. Therefore, you need to look for an insider threat management solution with a built-in MFA functionality.
By implementing MFA, you can make sure that the person attempting to enter the protected perimeter are who they claim to be. At the same time, the use of MFA makes it way harder for malicious insiders to access your company’s sensitive information.
It’s also important to have a good password management policy in place. The most basic recommendations include forbidding the use of default and simple passwords and changing passwords upon certain events (say, employee resignation) or after some periods of time (say, every month or every quarter).
2. Limit access whenever possible
Once you managed to make sure that only the right people can get access to your network and critical assets within it, it’s time to think about the access permissions each of your company’s employees has. It’s best to take some technical measures to mitigate insider threats and deploy the so-called least privilege principle when employees only have the exact access level they need to do their job.
But today, more and more companies go even further and deploy a zero trust security model. In a zero trust network, there’s no general protected perimeter that distinguishes trusted insiders from untrusted outsiders. Instead, each critical asset or system is fully protected from both insiders and outsiders, thus mitigating internal and external threats to cyber security.
Such an approach works best for the companies that cooperate actively with third-party vendors and subcontractors. It’s also a great solution for the enterprises with a bring your own device (BYOD) policy in place, allowing their employees to use personal devices for work purposes.
3. Monitor employee activity
User activity monitoring is the basis of many insider threat protection techniques. You need to be able to see what’s going on within your network, in real-time at best. When choosing among the solutions to protect against insider threats in cybersecurity, pick the one that allows to see a particular user session and terminate it if necessary.
Many companies also look towards User and entity behavior analytics (UEBA) as the key to effective threat monitoring and protection against insider threats. Advances in machine learning technologies allow building user profiles that include normal baseline behavior patterns for particular users or roles. Registering activities that deviate from these patterns may help detect malicious insiders and mitigate possible threats at an early stage.
4. Analyze logs and respond to security incidents
Continuous user activity monitoring is meant to give you full visibility across the enterprise network and provide you with detailed data for further analysis. Depending on the user monitoring solution, user activity logs may contain different types of information:
Names of files and applications opened by the user:
- URLs to the visited websites;
- Logged keystrokes;
- Recorded sessions, and more.
The proactive incident response also plays a significant part in building an effective insider threat cyber security program. There’s no point in detecting a malicious action if you’re unable to respond to it properly and, therefore, prevent a data breach from happening.
Look for an insider threat prevention solution that allows you both receiving real-time notifications about the detected security incidents and automating responses to the most common types of incidents. For instance, if the system registers, say, three unsuccessful login attempts, the account a user tried to access will be blocked.
Finally, if you want to be able to analyze all of the logged information on a deeper level, make sure that your insider threat prevention solution supports forensic data export.
5. Pay special attention to third-parties
Remote access control and protection is an essential part of the modern insider threat management program. Today, more and more organizations hire remote employees and grant access to critical corporate resources to third-party vendors and contractors. But, as reported in a 2018 study by the Ponemon Institute, third-party vendors were the cause of nearly 60 percent data breaches.
If granting third-party vendors access to business-critical data, systems, and application is a common practice for your organization, make sure you have an appropriate third-party management solution in place. Leverage all of the above-mentioned tools and practices to protect your corporate data from unauthorized access and use.
If your third-party subcontractors are using a shared account for accessing your corporate network or business applications, it’s preferable to add secondary authorization as an additional protection layer. This way, you’ll be able to clearly associate each session initiated under the shared account with a particular user.
And, finally, make sure that your third-parties are well aware of your organization’s cybersecurity policy and know what cybersecurity rules they must follow.
Conclusion
Insider threats have one of the biggest impacts on enterprise cybersecurity. In order to mitigate the risks related to insider threats, organizations should deploy complex solutions that include monitoring and audit of user activity, granular access and privilege management, and effective incident response.
This article is a contribution from Marcell Gogan. Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.
Industry News
LiveScore Group Announces Internal Restructuring as Part of Sustainable Growth Strategy
LiveScore Group has announced an internal restructuring process, expected to impact more than 100 existing roles across multiple business locations, including London.
The changes are seen as a difficult yet important step for LiveScore Group, streamlining the business to create improved structures and a pathway to long-term sustainable growth. All impacted employees have been informed and are now subject to a confidential consultation process.
Sam Sadi, CEO of LiveScore Group, said: “On behalf of all Directors of LiveScore Group, and the relevant subsidiary companies, we are saddened by the difficult decision to commence an internal restructure of the business, a process which impacts a significant number of our people.
“Whilst we celebrate our recent period of significant and exciting growth, we must now future-proof the organisation and ensure our internal structures allow us to achieve long-term and sustainable success.
“This is a hard time for all our people, as we say goodbye to colleagues who have played an important role in our journey across recent years.”
The announcement follows on from the recent news that LiveScore Malta Limited (part of LiveScore Group) is to withdraw its LiveScore Bet brand from the Netherlands following recent government tax increases in the market. The announcement includes those impacted by this. There will be no other customer impact in respect of any of the remaining LiveScore, LiveScore Bet or Virgin Bet sites globally.
Industry News
Pronet Gaming Appoints Alex Karaoulis as its New Commercial & Product Strategy Lead
Pronet Gaming, an award-winning platform provider of full turnkey solutions, announced the appointment of Alexandros Karaoulis as its new Commercial & Product Strategy Lead.
With over 14 years of experience in the iGaming industry, Karaoulis brings a wealth of knowledge and expertise that will be instrumental in driving the company’s strategic initiatives forward.
Throughout his iGaming career, Karaoulis has held various senior roles with B2B sportsbook and casino providers, as well as with B2C operators. His extensive background in marketing and sales within the iGaming sector positions him as a true industry expert, ensuring that Pronet Gaming remains at the forefront of innovation in a rapidly evolving market.
“I am thrilled to join Pronet Gaming and excited to fulfill my role in developing and executing sales strategies to drive the company’s revenue growth in key markets,” Karaoulis said.
With a track record in commercial strategies and driving product excellence, Karaoulis’ appointment is invaluable as Pronet Gaming now seeks to expand its footprint to Asia. His vision and deep understanding of the iGaming landscape equip him to navigate the unique challenges and opportunities that the dynamic region presents.
“I want Pronet Gaming to lead the iGaming revolution by providing innovative, culturally tailored solutions that cater to the diverse and rapidly growing demands of the region. Through strategic partnerships, cutting-edge technology, and a deep understanding of local markets, we aim to empower operators to offer world-class gaming experiences that engage players and drive sustainable growth,” he added.
According to Karaoulis, Pronet Gaming is poised to make a splash in Asia by leveraging its advanced technology, flexible platform solutions and deep market expertise while adapting to the unique characteristics of the region.
“The key differentiation point of Pronet Gaming is that we have B2C experience, which greatly aids in understanding the needs of operators and helping them to improve and execute their strategy according to the market. I have worked in B2C roles for more than seven years in my iGaming Career and managed campaigns across various channels, optimised conversion funnels, and learned to use data to improve player acquisition and retention,” said Karaoulis.
Karaoulis acknowledges that the marketing skills he has acquired from B2C experience are valuable in every B2B environment. As he dives into his new role at Pronet Gaming, Karaoulis aims to guide his operator clients on how to better market their own sites, including providing them with advice on effective acquisition strategies, content marketing and campaign structures that appeal to iGaming audiences.
“I also focus heavily on engagement strategies, loyalty programs, bonuses, and personalised offers to keep players active and returning. In my new B2B role, I will advise clients on best practices for player engagement, helping them adopt effective loyalty programs, personalised marketing, and retention tactics that drive player lifetime value to improve the end-player experience for our clients’ sites,” Karaoulis added.
Industry News
Vbet Wins Best Online Casino Operator 2024 at SiGMA Europe 2024
Vbet has been crowned the Best Online Casino Operator 2024 at the highly coveted SiGMA Europe event, cementing its position as a leader in the online gaming industry.
This achievement highlights Vbet’s commitment to providing an exceptional user experience by combining cutting-edge technology with a vast range of options and a secure process. The dedication to creating a responsible, enjoyable environment for players was recognised with this award, making this accolade even more significant. As Vbet continue to expand into new markets, the list of strategic partnerships grows alongside our constant drive to expand its offering. This award serves as a stepping stone on its path to reach more players and set new standards in the industry.
Arman Khachatryan, VBET’s Managing Director, said: “We are incredibly proud to receive the Best Online Casino Operator award at SiGMA Europe 2024. This recognition is a testament to the hard work, passion, and effort of our entire team. Our mission has always been to deliver the highest quality experience in the safest environment possible to our users. This award not only recognizes our dedication to this mission but also motivates us to continue expanding into new markets and territories.”
-
Latest News1 day ago
Make every pixel personal: Opera GX facelift lets you match your browser to your setup down to the smallest detail
-
Balkans7 days ago
EGT Digital’s iGaming platform X-Nave and successful titles to deliver high-quality experience to BetHub’s customers
-
Latest News1 day ago
Casino Management System Market to Reach USD 29.09 Billion by 2032 | Enhanced Security and Operational Efficiency Drive Growth | Research by S&S Insider
-
Asia7 days ago
Mascots Xiyangyang and Lerongrong ready for China’s 15th National Games
-
Australia7 days ago
ACMA: Tabcorp Pays $262,000 Penalty for Illegal In-Play Bets
-
Latest News7 days ago
AGREEMENT BETWEEN ZITRO AND GRUPO OSGA TO PROMOTE THE LABOT INTEGRATION OF PEOPLE WITH DISABILITIES
-
Latest News7 days ago
Week 46/2024 slot games releases
-
Latest News1 day ago
Fast Track Celebrates Third Year as a Great Place to Work Certified™ Tech Company