1. https://appdevelopermagazine.com/security
  2. https://appdevelopermagazine.com/guidelines-to-identify-and-protect-against-internal-network-security-threats/
2/19/2016 1:06:22 PM
Guidelines to Identify and Protect Against Internal Network Security Threats
/Internal-Security-Threats-App-Developer-Magazine_da2g93dk.jpg
App Developer Magazine
Guidelines to Identify and Protect Against Internal Network Security Threats

Security

Guidelines to Identify and Protect Against Internal Network Security Threats


Friday, February 19, 2016

Stuart Parkerson Stuart Parkerson


APCON, a provider of intelligent network monitoring solutions, has published a new guide to identify and protect against internal network security threats. The publication, “Safeguarding Your Network from Insider Threats,” highlights the impact of data breaches and internal threats, which despite receiving less public attention, can be just as dangerous and damaging as external hacks. 

The publication highlights two types of insider threats: the bad actor and the negligent employee. 

Not all inside threats are malicious. Negligent employees may unknowingly put sensitive data at risk by simply logging on through an unsecured, public Wi-Fi connection to access the company server. Employees downloading programs could unknowingly receive a virus or an unintentional lapse in security protocols could open the door to a data breach.

Internal breaches can also be much more malicious when, instead of a negligent act, a disgruntled or financially motivated employee is trying to do harm.

The eBook provides these common indicators of am internally compromised network:


- Unusual Outbound Traffic: One of the easiest ways to spot a potential breach is to look for unusual traffic patterns leaving a network.

- Anomalies In Privileged User Account Activity:  Often, more sophisticated attackers will either increase the network activity of a privileged account or will use a compromised account as a stepping stone to get to accounts with higher privileges. Closely monitoring the activity of privileged accounts help prevent this type of a breach. 

- Spikes in database read volume: An increase in database read volumes is a good indication that someone has made it inside of a network and is trying to extract information.

- Data in the wrong places: Data sitting in the wrong locations can be a good indicator of an internal breach that’s about to happen. Often hackers will gather data into one spot before extracting it.

The APCON free eBook is a free, ungated download.



Read more: https://www.apcon.com/press-release/apcon-releases...




Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.

MEMBERS GET ACCESS TO

  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here



Featured Stories


Tether QVAC SDK Powers AI Across Devices and Platforms
Tether QVAC SDK Powers AI Across Devices and Platforms Wednesday, April 22, 2026


APAC 5G expansion to fuel 347B mobile market by 2030
APAC 5G expansion to fuel 347B mobile market by 2030 Tuesday, April 21, 2026




How AI is causing app litter everywhere
How AI is causing app litter everywhere Tuesday, April 21, 2026


The App Economy Is Thriving
The App Economy Is Thriving Monday, April 20, 2026


NIKKE 3.5 anniversary update livestream coming soon
NIKKE 3.5 anniversary update livestream coming soon Friday, April 17, 2026


New AI tool targets early dementia detection
New AI tool targets early dementia detection Thursday, April 16, 2026


Jentic launch gives AI agents api access
Jentic launch gives AI agents api access Wednesday, April 15, 2026


Experts warn ai-generated health content risks misinterpretation without human oversight
Experts warn ai-generated health content risks misinterpretation without human oversight Wednesday, April 15, 2026


Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines
Ludo.ai Unveils API and MCP Beta to Power AI Game Asset Pipelines Tuesday, April 14, 2026


AccuWeather Launches ChatGPT Integration for Live Weather Updates
AccuWeather Launches ChatGPT Integration for Live Weather Updates Tuesday, April 14, 2026


Stay Updated

Sign up for our newsletter for the headlines delivered to you

SuccessFull SignUp

Get More App News



/sites/themes/prod/assets/js/less.js"> ' ' %>