Internal threats seem very difficult to predict/prevent, since the attacker has access to your organization's systems....
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Are there tools available that trigger alerts about unusual user behavior on a network for example? What else can organizations do to prevent internal network attacks?
Most IT security professionals will agree that insider threats are likely to be more severe in their impact than attacks from outside an organization. In addition to deploying network monitoring devices, such as intrusion detection (IDS) and prevention systems (IPS), assume that there will be attempts by employees to make unauthorized transactions on your systems that could result in fraud, theft of information and other illegal acts.
Increase diligence and proactivity with network monitoring; discuss the need for background checks with human resources; discuss the need for additional, in depth background checks for employees in potentially sensitive areas; provide more visible evidence of security monitoring activities; review and update security policies and procedures to deal with insider threats; and provide periodic remedial (mandatory) training of employees in security policies and procedures.
Dig Deeper on Disaster Recovery Planning-Management
Related Q&A from Paul Kirvan
Employee involvement in business continuity and disaster recovery planning starts with a business impact analysis. But participation in the rest of ...continue reading
If time constraints and other factors force you to eliminate risk assessment from your business continuity plan, discover how to focus your ...continue reading
You should be able to justify the need for a BC/DR plan. But here's what you can do if you fail to get management buy-in and you still want disaster ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.