Cybersecurity In-Depth

The Edge

8 Ways to Spot an Insider Threat

The good news is most insider threats derive from negligence, not malicious intent. The bad news is the frequency of negligence is already ahead of where it was in 2018.


'I'm Very Private'

Some users seek out ways to anonymize themselves or conceal any personally identifying information (name, phone, IP address, etc.).

The tools they turn to most frequently are private VPNs that give them plenty of cover, as well as the TOR browser, designed for anonymous browsing that also protects the user against any traffic analysis subsequent to their searching, clicking, and downloading.

Dtex's Burnell said these practices are alarmingly common — 60% of the company's survey sample found users actively attempting to bypass security measures through private or anonymous browsers.

(Image Source: Jane Kelly via Adobe Stock)