Dealing with the insider threat
February 2017, Cyber Security, IT infrastructure
The threats to businesses from insiders covers areas such as malware deployment, but also fraud and sharing of company data with unauthorised third parties. When looking at insider incidents, research company Gartner says about 62% of these involve employees looking to establish a second stream of income from their employer’s data, while 29% steal information when they leave to help them in the future. Only 9% are saboteurs.
Protecting your business from threats like these, even simply preventing someone from taking a customer contact list, is not that easy in an environment where data is freely available. Employees often have customer lists, business plans and other sensitive data on mobile devices – laptops, tablets and smartphones – which is reasonable as it can assist them in making sales and servicing customers. But how does a business ensure this data does not end up supporting a competitor’s organisation?
Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system, where employees and data are automatically monitored. The cloud and on-site systems function identically. Moreover, the company is also pushing out a series of behavioural analytics that can identify suspicious behaviours and raise an alert, or even lock down the suspected user.
The employee-monitoring solutions are installed on users’ computers and monitor everything they do, from application usage through to email, even including web-based email offerings like Gmail. Management is able to draw reports and trends of behaviour, while ensuring that specific data is not sent out of the company.
Teramind’s behaviour monitoring application is able to create a baseline of acceptable behaviour for users, highlighting any anomalies and reacting in accordance with company policy – which could allow manual or automatic lockdown in extreme cases. This year will also see the company releasing departmental monitoring, which monitors standard behaviours in departments, again reacting to anomalies as prescribed in the client’s policy.
Administrators are also able to customise their monitoring applications, to exclude Gmail from the monitoring process, for example.
The company is running a pilot site in South Africa and is expanding its reach in the region. Currently, local companies offering the Teramind solution include Telecommunications Solutions (firstname.lastname@example.org) and infoGuardian (email@example.com)
- Trusted Platform Module explained
May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
- Procore Trading
Securex 2017 preview, Cyber Security
Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...
- Hikvision launches Blazer Pro
May 2017, Hikvision South Africa, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Products
Hikvision has launched Blazer Pro, an all-in-one high-end server solution designed to meet the needs of medium to large camera count, mission-critical surveillance network projects.
- Fit-for-purpose solar cables
May 2017, Helukabel SA, Products, IT infrastructure
Helukabel’s Solarflex-X PV1-F solution for the solar industry is able to withstand the harsh environments of solar plants exceeds TÜV, CE, Rohs and VDE quality certifications to ensure longevity.
- Security skills shortage?
May 2017, Galix Networking, Cyber Security
We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.
- Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
May 2017, Vision Catcher, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
- Network cameras can improve smart city living
May 2017, Axis Communications SA, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
It is time to think outside the traditional security box and find new application areas where network cameras have the potential to make a significant difference to the quality of urban living.
- IoT running wild compromises security
May 2017, Genetec, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security
Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.
- Are you afraid of the dark (net)?
May 2017, J2 Software, This Week's Editor's Pick, Cyber Security
Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.
- Accelerating the community theme
May 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, News
Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.
- Securing your security
April 2017, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.
- Wireless works for CCTV
April 2017, MiRO Distribution, RADWIN, CCTV, Surveillance & Remote Monitoring, Cyber Security
Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.