WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

Insider Threat Attributes and Mitigation Strategies

CERT has released a new report, Insider Threat Attributes and Mitigation Strategies, which looks at the common attributes that insider threat cases have, according to its database of over 700 insider incidents.

The report also highlights the top seven characteristics that insider threat products should have based on the identified common attributes. These are:

1. Monitor phone activity logs to detect suspicious behaviors;
2. Monitor and control privileged accounts;
3. Monitor and control external access and data downloads;
4. Protect critical files from modification, deletion, and unauthorized disclosure;
5. Disable accounts and/or connections upon employee termination;
6. Prevent unauthorized removable storage mediums;
7. Identify all access paths into organizational information systems.

Read the document.

•Date: 28th August 2013 • US/World •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here