{"id":2349,"date":"2022-11-20T12:00:00","date_gmt":"2022-11-20T12:00:00","guid":{"rendered":"https:\/\/haloedsolutions.com\/?p=2349"},"modified":"2022-12-29T09:02:59","modified_gmt":"2022-12-29T16:02:59","slug":"insider-threats-are-getting-more-dangerous-heres-how-to-stop-them","status":"publish","type":"post","link":"https:\/\/haloedsolutions.com\/insider-threats-are-getting-more-dangerous-heres-how-to-stop-them\/","title":{"rendered":"Insider Threats Are Getting More Dangerous! Here’s How to Stop Them"},"content":{"rendered":"

<\/p>

One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.<\/p>

Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to keep intruders out. Since a logged-in user isn\u2019t seen as an intruder, those security protections aren\u2019t triggered.<\/p>

There are three troubling statistics<\/a> from a recent report by Ponemon Institute They illustrate the importance of addressing this threat. Insider attacks are getting worse, taking longer to detect and becoming more extensive.<\/p>

The report found that over the last two years:<\/p>