Home Cybersecurity Data Security Threats Could Be Lurking Inside Your Organization

Data Security Threats Could Be Lurking Inside Your Organization



When we think of data breaches, we typically think of external hackers stealing personally identifiable information (PII), often with the intent of gaining access to bank accounts, medical records or insurance funds. Yet, this stereotype doesn’t represent the full scope of data breach scenarios. There is another source of data theft that is often overlooked—employees.

Forty-three percent of data breaches occur at the hands of someone within the company. While some of these incidents are the result of human error, others are not so innocent. But regardless of the intent behind them, these data breaches carry serious consequences for brands including costly legal reparations and long-lasting brand damage.

The threat is increasing as companies capture and use more customer data for digital customer engagement. Customer data is the most vulnerable type of information because it holds high value for attackers. In fact, 57 percent of cybersecurity professionals ranked customer data as the number one target. The proliferation of customer data combined with an increasing number of channels and apps that use this information means there are potentially more opportunities for someone to steal and use it for fraudulent purposes.

One way companies can reduce the risk of insider-caused data breaches is by going beyond access management with policy-based data access governance. Identity data access management only goes as far as controlling who or what applications can access customer data. While this is important, policy-based governance adds another level of control and security. It controls what data leaves the organization and precisely defines who or what applications can use the data. This is critical to being able to securely share customer data to all of your apps, and it is also useful in preventing accidental or nefarious data sharing by employees or partners.

Policy-based governance enables you to define the types of data an employee can access based on administrative roles. A customer service representative may only need to see a customer’s order history, but not their financial data, for example. Limiting the type of data an employee can access can greatly reduce the ability for a former employee to expose or steal PII. Plus, it can help your organization demonstrate that it is enforcing security and privacy regulatory policies.

Ex-employees can pose another threat to data security. Thirty-nine percent of large businesses admit to taking as long as four weeks to close out a former worker’s account, and 49% of people have admitted accessing workplace digital resources after they have left a company. Ex-employees retaining data access is problematic on many levels, but particularly in cases where a terminated worker is disgruntled and seeking retaliation.

Another key way to protect data from unhappy ex-employees is to revoke all access to data as quickly as possible. With the right customer identity management solution, IT teams can easily revoke a former employee’s data access. It can also help teams limit current employee access to data and define exactly how that data can be used.

ON DEMAND WEBINAR: IT Roadmap to Customer Identity Management


This article was written by Michael Tarbet from Business2Community and was legally licensed through the NewsCred publisher network.



Online Degrees & Certificates In Cybersecurity

American Military University's online cybersecurity programs integrate multiple disciplines to ensure you gain the critical skills and management practices needed to effectively lead cybersecurity missions – from government or private industry. Learn from the leader. American Military University is part of American Public University System, which has been designated by the National Security Agency and the Department of Homeland Security as a National Center of Academic Excellence in Cyber Defense Education.

Request Information

Please complete this form and we’ll contact you with more information about AMU. All fields except phone are required.

Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Ready to apply? Start your application today.

We value your privacy.

By submitting this form, you agree to receive emails, texts, and phone calls and messages from American Public University System, Inc. which includes American Military University (AMU) and American Public University (APU), its affiliates, and representatives. I understand that this consent is not a condition of enrollment or purchase.

You may withdraw your consent at any time. Please refer to our privacy policy, terms, or contact us for more details.