Impact | Business Risk Management Blog

Blog Editor



Posts in Cyber Security.
By Lucie Huger, Andrew Hartnett on March 22, 2017 at 10:47 AM

Hand stopping data, concept of software protectionIn our last post, we talked about what insider threats are and why it is so important to consider them as you construct your data security policies.  The heart of an effective strategy to minimize risks from insider threats is the concept of access controls – limiting users’ privileges to the minimum necessary – but access controls alone are not enough.

Facebook Twitter LinkedIn Google+ Email
By Andrew Hartnett on March 9, 2017 at 9:15 AM

Digitized lock imageWhile the primary data security objective has long been to keep malicious actors out, it is important not to overlook insider threats. According to the IBM Cyber Security Intelligence Index, in 2014, more attacks originated as a result of insiders than outsiders. Moreover, the major cybersecurity enforcement action taken by the Securities and Exchange Commission (SEC) last year involved an insider.

Facebook Twitter LinkedIn Google+ Email
By David Goodman on July 15, 2015 at 2:22 PM

privacy-policy-510731_1920Almost daily, we hear about cyber attacks on big businesses and government agencies. But the attacks are not isolated to the big entities. Your business’s most valuable trade secret information more than likely resides in an electronic database that is vulnerable. Yet probably the greatest threat to that database may come from within: your own employees.

Facebook Twitter LinkedIn Google+ Email

This website uses cookies to improve functionality and performance. If you choose to continue browsing this website, you consent to the use of cookies. Read our Privacy Policy here for details.