10 Ways Hackers Will Get The Best Of You

1. Privilege Abuse

Privilege abuse happens when an employee or trusted partner takes advantage of system access privileges that they are granted and use them to simply view files or conduct data theft, according to Verizon. The report said 88 percent of the insider misuse security incidents it analyzed involved some form of privilege abuse. The firm said its analysis found some cases of insiders being bribed to steal data for fraud schemes. Organizations need to more closely monitor employee activity, Verizon said. Quickly remove access to employees that leave the company. Monitor systems for unusual login attempts and other actions that could signal an issue. Limit access to the most sensitive systems and segment them from the rest of the network, Verizon said.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.