Security

CYBERSECURITY PRIORITIES SHIFT TO INSIDER THREATS

By Hendrix Bodden • January 7, 2015

The Sony breach – and virally every other recent high profile breach – has finally driven home what GreyHeller has been saying for some time – that the insider threat vector is as dangerous as the perimeter threat vector.

This survey of Federal IT managers in both civilian and defense sectors supports our view: Survey Cybersecurity priorities-shift insider threats

Security concerns from the survey:

  • Cyber hygiene
  • Phishing
  • Malware
  • Spam tactics

Interestingly, data breaches and cyber espionage were further down the list. Really??!! We couldn’t agree less – data breach (leakage, unintentional disclosure, spillage) – is as serious a threat vector as any.

Finding ways to mitigate and remediate after a breach have got to be on the top of any organization’s cybersecurity priority list.

Stay Updated

Security

GreyHeller January Security Webinar Series

By Hendrix Bodden • January 6, 2015

January 5, 2015 – San Ramon, CA – GreyHeller today announced an Insider Threat Security Webinar Series focused on helping organizations protect their ERP sensitive data from malicious and inadvertent insider threats.

The Insider Threat Series will use recent, high profile breaches at Sony and higher education institutions as examples of what could have been done to prevent insider threat attacks.

“Cyber security priorities have shifted in recent years to insider threats as the top attack vector,” said Greg Wendt, GreyHeller’s Executive Director of Security Solutions. “These types of breaches can be mitigated with rigorous ERP system Credentials Management, strict employee training and implementing two-factor authentication, logging and analytics.”

The Insider Threat Security Webinar Series is part of GreyHeller’s commitment to educate users of major ERP systems on how to fight cyber crime and prevent their organizations from becoming the next news headline.

GreyHeller will deep dive into:

  • Two-Factor Authentication
  • REN-ISEC Recommendations for HCM
  • Logging and Analysis
  • Data Masking
  • Location Based Security

Each webinar is an hour long and begins at 11:00am PST. For more information and to register, click here.

Insider Threat Security Webinar Series

About GreyHeller

GreyHeller’s software solutions help nearly 100 global organizations secure their ERP sensitive data from cyber crime. For more information about GreyHeller, please visit www.greyheller.com.

Stay Updated