02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

cloud footprints. Furthermore, only 12 percent of enterprises reported that they are able to detect insider<br />

threats stemming from any personal mobile device. While an additional 39 percent said that they can<br />

detect these threats if personal devices are used on premises or have agents installed, this is not as<br />

helpful as it may initially seem. BYOD means that data is frequently being accessed remotely – outside<br />

of the network perimeter. Additionally, employees tend to reject agents on their personal phones because<br />

they can invade their privacy and impair the functionality of their devices. In other words, the<br />

aforementioned 39 percent still need to take steps to secure personal endpoints from insider threats.<br />

In addition to the above, many companies are failing to employ other tools and practices that are needed<br />

to stay safe. Alarmingly, only 50 percent of organizations are providing user training to combat insider<br />

threats. As many of these threats are caused purely by negligence, training employees on security best<br />

practices (such as password hygiene and how to spot phishing emails) has proven to be effective. Most<br />

employees want to help keep their company secure, but need to know how their actions fit into the<br />

equation. Another area in which organizations must improve is in the use of secondary authentication.<br />

While the tool is helpful for preventing malicious data access when users surrender their credentials, a<br />

mere 31 percent of organizations stated that they currently use it. In light of these issues, it is not<br />

surprising that 68 percent of organizations felt moderately to extremely vulnerable to insider threats.<br />

Enterprises wishing to adapt to today’s dynamic business landscape through the use of cloud, BYOD,<br />

and other innovative solutions must be able to detect, prevent, and respond to insider threats. By<br />

understanding modern risks and leveraging appropriate security solutions like cloud access security<br />

brokers (CASBs), the vast majority of insider threats can be reduced or even eliminated.<br />

About the Author<br />

Rich Campagna is the CMO of Bitglass. He joined as VP of products<br />

and has served in various roles at the company. Prior to joining<br />

Bitglass, Rich was senior director of product management at F5<br />

Networks, responsible for access security. Rich gained valuable<br />

experience in product management and sales engineering at Juniper<br />

Networks and at Sprint before working at F5. Rich received an M.B.A<br />

from the UCLA Anderson School of Management and a B.S. in<br />

electrical engineering from Pennsylvania State University. Rich can be<br />

reached online through Bitglass’ website: http://www.bitglass.com/<br />

46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!