Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
cloud footprints. Furthermore, only 12 percent of enterprises reported that they are able to detect insider<br />
threats stemming from any personal mobile device. While an additional 39 percent said that they can<br />
detect these threats if personal devices are used on premises or have agents installed, this is not as<br />
helpful as it may initially seem. BYOD means that data is frequently being accessed remotely – outside<br />
of the network perimeter. Additionally, employees tend to reject agents on their personal phones because<br />
they can invade their privacy and impair the functionality of their devices. In other words, the<br />
aforementioned 39 percent still need to take steps to secure personal endpoints from insider threats.<br />
In addition to the above, many companies are failing to employ other tools and practices that are needed<br />
to stay safe. Alarmingly, only 50 percent of organizations are providing user training to combat insider<br />
threats. As many of these threats are caused purely by negligence, training employees on security best<br />
practices (such as password hygiene and how to spot phishing emails) has proven to be effective. Most<br />
employees want to help keep their company secure, but need to know how their actions fit into the<br />
equation. Another area in which organizations must improve is in the use of secondary authentication.<br />
While the tool is helpful for preventing malicious data access when users surrender their credentials, a<br />
mere 31 percent of organizations stated that they currently use it. In light of these issues, it is not<br />
surprising that 68 percent of organizations felt moderately to extremely vulnerable to insider threats.<br />
Enterprises wishing to adapt to today’s dynamic business landscape through the use of cloud, BYOD,<br />
and other innovative solutions must be able to detect, prevent, and respond to insider threats. By<br />
understanding modern risks and leveraging appropriate security solutions like cloud access security<br />
brokers (CASBs), the vast majority of insider threats can be reduced or even eliminated.<br />
About the Author<br />
Rich Campagna is the CMO of Bitglass. He joined as VP of products<br />
and has served in various roles at the company. Prior to joining<br />
Bitglass, Rich was senior director of product management at F5<br />
Networks, responsible for access security. Rich gained valuable<br />
experience in product management and sales engineering at Juniper<br />
Networks and at Sprint before working at F5. Rich received an M.B.A<br />
from the UCLA Anderson School of Management and a B.S. in<br />
electrical engineering from Pennsylvania State University. Rich can be<br />
reached online through Bitglass’ website: http://www.bitglass.com/<br />
46