The Leading News & Information Service For The Facilities, Workplace & Built Environment Community

Dealing with the Enemy Within

01 April 2016 | Updated 01 January 1970

The so-called insider threat issue has become one of the major concerns surrounding data protection and according to Verizon DBIR, 69% of reported security incidents involved an insider with detection with such an attack taking some 32 months to unearth.


The ObserveIT option is said to allow management to:

  • Achieve real time visibility into all insider threats.

  • Identify and prevent unauthorised behaviour.

  • Complete investigations in minutes instead of months.

Claiming to offer more than software for the monitoring of employees the system is being promoted as a behavioural analytics tool that builds a profile of risky behaviour allowing management to be alerted at an early stage, to anything of concern. Actions are graded in terms of severity and moved up the scale until an alert is triggered which highlights the need for investigation. In addition, the system is said to be a useful training tool as it alerts users to their actions, enabling them to re-consider their choices.

“Many security incidents stem from people, whether it’s getting infected, misbehaving or making honest mistakes but being able to be alerted to unauthorised activity early on enables a company’s security policy to be enforced, at an early stage, helping to eliminate risk at source,” explained Colin Tankard, MD, Digital Pathways. “Digital Pathways specialises in the installation of robust data security measures and teaming up with ObserveIt now bridges the gap between external and internal security.”

Picture:  Colin Tankard, MD, Digital Pathways – partnership with ObserveIT bridges the gap in tackling insider threats

Article written by Robin Snow | Published 01 April 2016


Related Articles

On Trend - Can Hackers Turn The Heat Off?

Ken Munro of Pan Test Partners has written a blog - the original of which and more pictures can be accessed if you Click Here  Munro says he has found...

 Read Full Article
Top 10 IT Security Predictions for 2018

As the headline fact, blatantly states, we have the top ten IT security predictions - courtesy of Ian Kilpatrick.   1. Security blossoms in the...

 Read Full Article
Andromeda Strained - International Cyber Op Dismantles Botnet

On November 29, the Federal Bureau of Investigation, in close cooperation with the Luneburg Central Criminal Investigation Inspectorate in Germany, Europol’s...

 Read Full Article
Action Fraud Helpline Goes Live For Live Cyber Attacks

Action Fraud, the national fraud and cyber crime reporting centre, has launched a 24/7 live cyber-attack helpline. During its pilot since October 2016, Action...

 Read Full Article
NHS Seeks Friendly Fire Power In Cyber War

NHS Digital has announced (Nov 28) a £20m project to boost its ability to support the NHS with its data security - including making funds available to encourage...

 Read Full Article
Uber And The Cyber Nightmare Ride

In an unprecedented move, the National Cyber Security Centre has commented specifically on the Uber data breach - with a coded reference to the fact that Uber tried to...

 Read Full Article
If Dolly Can Be Hacked, What About The Hand Dryer?

  Connected toys with Bluetooth, wi-fi and mobile apps may seem like the perfect gift for Christmas. But Which? has found that, without appropriate safety...

 Read Full Article
Yahoo Cyber Breach Was Bigger

Yahoo has announced (week ending Oct 6) that it is providing notice to additional user accounts affected by an August 2013 data theft previously disclosed by the company...

 Read Full Article
FTSE 350 - General Data Protection Awareness Good

The Government will soon be introducing its new Data Protection Bill to Parliament. With this almost certain to come into effect next May, implementing the General Data...

 Read Full Article
FTSE 350 Cyber Governance Health Check

Britain’s top firms and charities urgently need to do more to protect themselves from online threats, according to new Government research and a ‘cyber health...

 Read Full Article