Insider Risk

Dealing With Insider Risk Starts Before They’re An Insider

By Veriato Team

Quick question: does your company have a ‘one size fits all’ approach to screening perspective hires?

The answer is (I hope) ‘of course not.’ Depending on the position being filled, companies apply different levels of scrutiny. When hiring a new CFO, for example, one can reasonably expect more rounds of interviewing and a more stringent background check than when hiring an entry-level bookkeeper.

What you are doing in your hiring process is appropriately setting risk levels by position. You may not have a formal matrix of every position in your company with a corresponding risk level ‘ but you should.

We background check, interview, and check references ‘ all to help us decide if we can trust. If we determine a candidate is trustworthy (and, of course, qualified) we make an offer, and if all goes well, bring them onboard.

Unfortunately, the constant drumbeat of insider driven fraud, theft, leaks, etc., serves as an ever-present reminder that trust is not a viable security strategy. So, we should first look at each position and determine, based on the level of access to critical information and/or information systems, how much risk the company has should the position holder ‘ the insider ‘ go rogue. It can be as simple as a 1-10 scale.

Next, we should insure that, for positions with greater risk, we are monitoring the activity of the insider more closely than for positions with less risk. There are numerous ways to monitor employee activity ‘ here at SpectorSoft we are obviously partial to our approach. But regardless of how you do so, if you are serious about mitigating insider risk, detecting and preventing insider threats, and generally insuring the security of your most critical data and systems, assigning risk levels and aligning monitoring profiles to them is a great first step.

Insider Risk – How Prepared Are You?

Insider Risk – How Prepared Are You?

Not every company is equally prepared to deal with insider risk. This report outlines the four stages of insider risk maturity and explores how to improve your insider risk preparedness.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Insider Risk & Employee Monitoring Resources

Smart Year-End IT Investments- A Trifecta for ROI

Smart Year-End IT Investments- A Trifecta for ROI

Drive Productivity, Reduce Insider Risk, Enforce Compliance As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won't roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic...

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Key Takeaways: Closing the Gaps in Traditional Security Tools: IAM, SIEM, and DLP are vital but insufficient in addressing insider risks. They focus on access control, event logs, and data protection without understanding the behavioral context that signals insider...