{"id":4572,"date":"2018-10-10T10:17:14","date_gmt":"2018-10-10T04:47:14","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=4572"},"modified":"2024-10-03T16:27:38","modified_gmt":"2024-10-03T10:57:38","slug":"cyber-security-threat","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/cyber-security-threat","title":{"rendered":"Is Your Biggest Cyber Security Threat Inside Your Company?"},"content":{"rendered":"\n

According to the Kaspersky Lab\u2019s study over 5,000 businesses around the globe, employees are the biggest weakness to IT security for 52 percent of them. <\/p>\n\n\n\n

With cyber security becoming a major concern these days, businesses are adopting every possible measure to tackle outside threats. While outside security threats seem quite menacing, insider security risks can be equally dangerous for your network safety.<\/p>\n\n\n\n

Insider threats can come from anywhere, be it inconsistent password policies or unmanaged data in the personal devices of your employees. Such threats are often difficult to spot and stop. Quite possibly, the person sitting in the cubicle next to yours might be using weak passwords for email access, and putting sensitive information at risk. Insider threats often lead to electronic theft, stolen credentials, misaddressed emails and unintentional data leaks.<\/p>\n\n\n\n

Motivated by any personal or financial interest, your employees can expose sensitive data to unauthorized sources. Many a time, because of their negligence, the data in their system is compromised by outsiders.<\/p>\n\n\n\n

So, what steps can be taken to mitigate insider threat risks?<\/p>\n\n\n\n

Before mulling over the ways to tackle insider threats, let\u2019s understand in detail the major types of insiders:<\/p>\n\n\n\n