How to Balance Insider Threats And Employee Privacy

Posted by: Team | NewsPatrolling 2 hours ago Leave a comment

Forced to work remotely due to the Covid19 pandemic, IT departments across the industry amplified their cyber tools to support cloud and hybrid working environments. The rapid shift to Work from Home (WFH) unlocked new data security challenges to be tackled. Every home device or wireless connection became a potential entry point for malicious actors and cybersecurity administrators faced an additional challenge of insider threats.

While disgruntled employees were always a threat for organizations, the risk increased considerably in the remote working scenario due to lack of secure access to offsite networks and systems. No longer the resentful employees driven by personal agendas are the only insider threats for businesses. Negligent, overworked, or unaware employees who do not follow security protocols are equally responsible for a large amount of data leakage and data theft. With Bring Your Own Device (BYOD) on a rise, employees merge personal and professional use on one system. Moreover, sensitive information such as access codes or passwords is saved on unsecured home networks, and personally, identifiable information is freely transferred to and from these devices. Remote employees thrust into new working environments with little to no training for handling new security risks and casual attitude towards corporate data led to an increased data breaches, thereby, making it necessary to expand the scope of data protection against insider threats.

With remote working becoming the new normal, organizations need to build a robust and sustainable data protection strategy that wouldn’t restrict employees’ productivity and provide organizations with control over the data that needs to be regulated and protected. One way of ensuring data protection is by installing Data Loss Protection (DLP) software on the endpoint – the devices being used. The encryption feature of DLP further strengthens the security factor such that even if the devices are lost or stolen, the data cannot be compromised. A DLP solution gives the control required to ensure granular and unified policies across evolving cyber landscape. However, protecting the organization from data breaches while being sensitive to employee needs require a fine balance which can be achieved with the following measures:

It is not an exaggeration to say that insider threats are more complex in the WFH setting. An established data protection policy considers the role of employees in safeguarding a company’s sensitive data and incorporates data-monitoring as a must-have component of data loss prevention technology.

BY:  Filip Cotfas, Channel Manager, Cososys

Share !