cStor Secures AZ Gaming License to Offer IT Services to Gaming Industry cStor Gives Back to Local Communities During the Holidays

Three Security Strategies to Protect Your Business Against Insider Threats

office-95311_960_720Insider attacks on corporate data and resultant losses have a negative effect on the victims who have the difficult tasks of recovery plus the stress of managing the long-lasting impact to trust and credibility. In the case of the Target breach where 40 million records were lost, costing the company millions, the CEO payed the ultimate price by having to resign.

Insider threats can be either malicious or accidental. Employees might do things that put an organization and its data at risk—even if not intended. Outsiders—suppliers, contractors, and others with inappropriate access—might steal user credentials. The types of users that put key business assets at most risk are insiders such as employees, management, IT staff, and contractors plus outsiders through compromising insider credentials.

Fortify your fortress—monitor who gets what, when, and where. It is critical to manage admin privileges, monitor use, and guard access to networks and data.

The threat landscape is complex and continues to develop, putting pressure on security systems. A Q3 2014 Harris Poll reveals that 40% of organizations experienced a data breach or failed a compliance audit in the last year. Proper controls must be installed for all of these groups with the opportunity to reach inside corporate networks in order to prevent theft of unprotected data.

While the bulk of sensitive data assets are databases, file servers, and cloud service environments, mobile is perceived as a high-risk area of concern. Security measures need to protect current business models and be ready to scale for future needs—both projected and unknown possibilities. Concerns over privileged user access have reached the top of security agendas. Controlling, monitoring and auditing access rights for employees, IT personnel, contractors and service providers, plus business partners are top priority.

At cStor, we look at each client’s needs in order to design specific protection measures and make recommendations for where security budgets should be invested. Security spending is expected to continue with double-digit increases. It is critical to target spending on areas to control access and protect data in a way that supports continued business activity and compliance requirements. To know and to control who gets access and what they can do with that access provides the ability to detect and thwart misuse that could put sensitive data at risk.

Walt Westfall
About Walt Westfall
As the Director of IT Transformation, Walt is responsible for ensuring that the cStor technical pre-sales team provides clients with innovative data center and cloud solutions, as well as thought leadership for healthcare, manufacturing, government, education, retail, insurance, utility and other industries. His technical and business acumen and management expertise stem from years of high-tech and IT business development. His leadership experience includes companies such as NetApp, EMC, WD McMillan Consulting and Sanas Technologies (an application aware data-management software startup business). Walt attended Eastern Washington University along with the Executive and Enterprise Leadership Education Program at Babson College.

Comments are closed.