Cyber Security Month - Insider Threats

Marc Kaplan

The Department of Defense has made cybersecurity one of its top priorities. Recent high profile breaches and attacks have put industries of every kind on their toes when it comes to protecting their crucial infrastructure

One of the benefits of Cyber Security Month – created by the Department of Homeland Security in 2004 -- is the opportunity it presents to talk about the many different types of cyber-attacks and discuss solutions to address them. While most will be familiar with the risk of attacks from outside parties, perhaps an even greater threat to your organization is an insider threat.

Insider threats are a significant problem. While there have been well-documented cases of malicious users within an organization orchestrating attacks from the inside, a far more common – and equally significant – insider threat is the possibility of inadvertent network exposure.

Between complex network configurations, high maintenance firewalls, IT shortcomings, and human error, there are major in-house risks to an organization’s critical data and infrastructure. According to a 2016 study done by the Ponemon Institute, out of 874 reported insider-related breaches from a wide range of industries, 568 were the result of employee or contractor negligence, 85 were cases of outsiders using stolen credentials, and 191 were caused by malicious parties within the organization. Each one of these incidents was either intentionally or unintentionally the result of an employee with significant access to vital information either abusing or mishandling it.

With great access comes great responsibility – this is why it is so important to make sure the right people have access to the right resources. At Tempered Networks, our platform is designed to help you manage just that.

Often times, setting up and then revoking access is a complex and time-consuming task. However, Identity-Defined Networking makes managing access as easy as its ever been, while enabling network administrators to instantly revoke access if need be. Through Tempered’s HIP platform, micro-segmentation and network access control based on identity makes it easier than ever to make sure authenticated identities have accountable access to the correct information.

Many of today’s technologies across industries are susceptible to zero day attacks, vulnerabilities, insider errors, and more. This is why the Department of Defense is looking for innovative technologies to combat the ever-growing threat of large scale attacks. Tempered’s Identity-Defined Networking is at the forefront of innovation with no competitors on the market.