The Cyber Source blog

Cyber Security, in plain English

Real Life Cyber Stories: Data Theft [Video #2] - 'The Inside Job'

Real-life-cyber-stories-ransomware-heist

#2 "The Inside Job"

Financial services company face an internal data theft.

Protecting yourself from inside threats is difficult to predict and hard to identify.  Insider data theft may be due to a malicious employee taking or selling your corporate data or simply making an unintentional mistake.  These breaches are significant enough to make front page news headlines, causing irreparable reputational damage to the companies involved.

Is data security at the heart of your operations?

[ View more Real Life Cyber Crime Stories » ]

Story 2 - The inside job_Comtact FINAL-SUBTITLED

WATCH ANOTHER STORY

Take proactive steps to mitigate the risk of insider data theft, including:

  • Establishing an acceptable use policy
  • Training employees on all procedures and policies relating to cyber security
  • Providing a means for employees to conveniently report suspicious activities
  • Remaining especially vigilant when employees leave the company

#Getcybersecure - Take the first step towards cyber improvement

Even for the IT-savvy, navigating the mass of security information and technology solutions can be a daunting task, but becoming cyber secure doesn't need to be as challenging as it may appear.  It starts by identifying and prioritising your risks to so that you can build a solid foundation for improvement.

Get our best tips and expertise in The CIO's Guide to Cyber Security  Improvement »

As one of the UK's foremost cyber security specialists, we've jam-packed our best practice advice , insightful tips and experience into 30-pages of step-by-steps guidance to help you identify your current risk exposure, protect your critical assets and build a board-level security strategy.

#getcybersecure and measurably improve your cyber security - whether you're an IT leader responsible for 50, 5,000 or 50,000 users.

CIO-Expert-Step-by-Step-Guide-to-Cyber-Security-Improvement


Related Articles:


 


About Comtact Ltd.

Comtact Ltd. is a government-approved Cyber Security and IT Managed Service Provider, supporting clients 24/7 from our ISO27001-accredited UK Security Operations Centre (SOC).

Located at the heart of a high security, controlled-access Tier 3 data centre, Comtact's state-of-the-art UK Cyber Defence Centre (SOC) targets, hunts & disrupts hacker behaviour, as part of a multi-layered security defence, to help secure some of the UK's leading organisations.

Explore our 24/7 Security Operations Centre (SOC)

SHARE THIS STORY | |

Sign-up for weekly updates

Recent Posts

Recent Posts