Take countermeasures to insider threats now with Imperva

Take countermeasures to insider threats now with Imperva

More and more companies are recognizing that insider threats pose a risk. The only thing missing is the initiative needed to tackle the problem. There are measures companies can take immediately to mitigate the risk. Many of them require some planning, not to mention board and team buy-in. The Imperva Test now offers a simple approach.

Find out how to better defend against insider threats with five questions.

Here’s an overview:

  1. Do you use multi-factor authentication (MFA)?
    MFA is used in addition to regular username and password verification and makes it harder for outside cyber attackers to gain access to become an insider threat, even if they bypass the initial authentication step by brute-forcing a username and password.
  2.  Do you review policies for users?
    The principle of least privilege is a proven and easy-to-implement cybersecurity best practice. Simply put, this means that a user should have no more access to data and systems than is necessary to do their job. When employees leave the company, jobs are restructured with appropriate changes to access permissions and data checks.
  3. Do you regularly run simulations of phishing attacks?
    The most common type of insider threat is the result of innocent mistakes, such as leaving a device unprotected or falling victim to a scam. Even employees who have no ill intentions fall victim to phishing scams and click on an unsafe link that can infect the system with malware. Phishing scams can be detected and avoided with proper know-how.
  4. Do you enforce security policy controls in your cloud-managed data stores?
    Applying security policies here can actually be tricky. When organizations don’t have complete visibility into their cloud-managed environments, the risk of security breaches from insider threats increases significantly. The best practice here to protect sensitive cloud data from insider threats is to work with experienced cloud security experts
  5. Are you using an analytics tool to investigate previous threats and define unusual user activity?
    The most dangerous threat is the so-called “resident insider.” It infiltrates the network and remains an insider for months. Organizations should use a solution that employs machine learning to analyze anomalous behavior and detect malicious insider activity. Machine learning algorithms can detect the typical access of the privileged user and issue alerts when deviations occur.

Asking costs nothing – but is good for business

We think: Imperva’s 5-question test offers every opportunity to make customers aware of this important issue. Anyone who answers “no” to just one question already has what it takes to become your customer. Contact your sales team now. For more information, click here.