{"id":212,"date":"2020-03-20T07:45:15","date_gmt":"2020-03-20T07:45:15","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=212"},"modified":"2020-03-20T07:45:15","modified_gmt":"2020-03-20T07:45:15","slug":"common-sense-guide-to-mitigating-insider-threats","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/common-sense-guide-to-mitigating-insider-threats\/","title":{"rendered":"Common Sense Guide to Mitigating Insider Threats"},"content":{"rendered":"\n<p><strong>What is an Insider Threat?<\/strong><\/p>\n\n\n\n<p>The CERT Division\u2019s definition of a malicious insider is a current or former employee, contractor, or business partner who meets the following criteria:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>has or had authorized access to an organization\u2019s network, system, or data<\/li><li>has intentionally exceeded or intentionally used that access in a manner that negatively affected the confidentiality, integrity, availability, or physical well-being of the organization\u2019s information or information systems or workforce.<\/li><\/ul>\n\n\n\n<p>For the purpose of this guide, an unintentional insider threat is defined as a current or former employee, contractor, or other business partner who meets the following criteria:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>who has or had authorized access to an organization\u2019s network, system, or data and who, through <\/li><li>their action\/inaction without malicious intent <\/li><li>cause harm or substantially increase the probability of future serious harm to the confidentiality, integrity, or availability of the organization\u2019s information or information systems <\/li><\/ul>\n\n\n\n<p>See the full guide <a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2016_005_001_484758.pdf\">here<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is an Insider Threat? The CERT Division\u2019s definition of a malicious insider is a current or former employee, contractor, or business partner who meets the following criteria: has or had authorized access to an organization\u2019s network, system, or data has intentionally exceeded or intentionally used that access in a manner that negatively affected the &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/common-sense-guide-to-mitigating-insider-threats\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Common Sense Guide to Mitigating Insider Threats&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[14],"tags":[],"class_list":["post-212","post","type-post","status-publish","format-standard","hentry","category-insider-threats"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=212"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/212\/revisions"}],"predecessor-version":[{"id":213,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/212\/revisions\/213"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}