Hacking Book | Free Online Hacking Learning


eight surprising facts from internal security threats

Posted by agaran at 2020-04-03

Although insider threats are usually more rare than external attacks, once they occur, they pose more serious organizational risks.

For work reasons, insiders need access to sensitive intellectual property and systems to complete their work. Therefore, when they inadvertently break the management regulations, or carry out intentional theft, it will inevitably bring great damage and risk. The following is a report from a number of well-known security enterprises and research institutions, in which the data is surprising.


Over the past 12 months, Accenture and the HFS Institute have reported that 69 percent of corporate security managers have found illegal data access and theft attempts from insiders.


According to the Ponemon Institute, 62% of business users have exceeded their authority to access data they should not see.


Ponemon's report also shows that 43% of enterprises need to check their employees' access to files or e-mails every month.


According to the SANS Research Institute, almost one-third of institutions do not have the ability to prevent or contain insider trading events or threats of internal security attacks.


The SANS report also said that only 9% of people know how to effectively prevent internal security threats.


Mimecast's research on e-mail security risks shows that 45% of CTOs are prepared to deal with malicious attacks from within.


According to Gartner's research on detecting internal malicious security incidents, 62% of employees involved use sensitive data of employers as their second income, 29% steal information from companies, and 9% are pure saboteurs.


A group of internal training slides of the US military leaked. Hillary Clinton and Snowden were described as "internal" threats to us national security by the military.

The photos on the list of confidential training materials inside the U.S. Army are: major Hassan of the U.S. Army, U.S. soldier Manning, former U.S. intelligence employee Snowden, U.S. veteran Aaron Alexis, U.S. veteran Aaron Alexis, former U.S. Secretary of state, U.S. presidential candidate Hillary Clinton in 2016

PR0. S, we are used to using firewall, IDS, etc. to prevent attacks from the outside, and using vulnerability scanning, etc. to strengthen the "robustness" of the internal system. How many people care about the security threats from the "inner ghost"?

From Hillary Clinton and Snowden to swift, Taiwan and Thailand, there are insiders behind them. The data and characters in this article further remind us to pay attention to the internal security threats.