1. Guidelines to Identify and Protect Against Internal Network Security Threats
2/19/2016 1:06:22 PM
Guidelines to Identify and Protect Against Internal Network Security Threats
https://news-cdn.moonbeam.co/Internal-Security-Threats-App-Developer-Magazine_da2g93dk.jpg
App Developer Magazine
Security

Guidelines to Identify and Protect Against Internal Network Security Threats


Friday, February 19, 2016

Stuart Parkerson Stuart Parkerson

APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as external hacks. 

The publication highlights two types of insider threats: the bad actor and the negligent employee. 

Not all inside threats are malicious. Negligent employees may unknowingly put sensitive data at risk by simply logging on through an unsecured, public Wi-Fi connection to access the company server. Employees downloading programs could unknowingly receive a virus or an unintentional lapse in security protocols could open the door to a data breach.

Internal breaches can also be much more malicious when, instead of a negligent act, a disgruntled or financially motivated employee is trying to do harm.

The eBook provides these common indicators of am internally compromised network:


- Unusual Outbound Traffic: One of the easiest ways to spot a potential breach is to look for unusual traffic patterns leaving a network.

- Anomalies In Privileged User Account Activity:  Often, more sophisticated attackers will either increase the network activity of a privileged account or will use a compromised account as a stepping stone to get to accounts with higher privileges. Closely monitoring the activity of privileged accounts help prevent this type of a breach. 

- Spikes in database read volume: An increase in database read volumes is a good indication that someone has made it inside of a network and is trying to extract information.

- Data in the wrong places: Data sitting in the wrong locations can be a good indicator of an internal breach that’s about to happen. Often hackers will gather data into one spot before extracting it.

The APCON free eBook is a free, ungated download.



Read more: https://www.apcon.com/press-release/apcon-releases...

Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.

MEMBERS GET ACCESS TO

  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here