45% of all attacks were carried out by insiders[i]
Common Core Practices Promoted by Industry to Prevent Insider Threats and why they are limiting (in bold and italicized)
Rules do not keep people from stealing.
Infected devices communicate within the rule structure to find an “exfiltration” opening.
Virus checkers do not prohibit people from stealing.
Individuals using USB can carry out sensitive Data or other small hard drives.
Strong Boundary Protection
Authorized persons theft of critical infrastructure behind firewalls still occurs.
Immediate alerts – usually rarely implemented - must be placed upon movement of any sensitive, critical documentation. Also individual will know how to act “within the norm” to hide illegal transferring the data.
Mandating constant password change leads to written down notes, which can be stolen.
Hardware in which the complex password is being inputted into is already compromised.
IT policies and training will not prevent individuals from stealing files. Nor will it deter an infected mobile phone from gaining access to fileshare within the network.
We incorporate powerful artificial intelligence, dynamic behavioral benchmarking and 1000s of mannerisms to discover both human and machine threats from within the network.
[i] IBM X-Force® Research 2016 Cyber Security Intelligence Index