Latest News
5 Best Practices to Prevent Insider Threats in 2019
Reading Time: 4 minutes
Data breaches caused by insiders cost enterprises millions of dollars. According to the Ponemon Institute, every year, companies lose up to $8.7 million due to insider threats. To ensure an appropriate level of enterprise data protection, security officers continuously look for ways to improve their current insider threat management solution. With the following insider threat management best practices, you’ll be able to protect your sensitive business information and keep malicious insiders at bay.
1. Consider access controls
It’s essential to keep your critical assets inaccessible for malicious insiders. First and foremost, deploy multi-factor authentication (MFA) for the most valuable systems, applications, and services. Your goal is to make sure that any malicious insider won’t be able to borrow a password from their colleagues and get a hold of the data they aren’t supposed to have access to. Therefore, you need to look for an insider threat management solution with a built-in MFA functionality.
By implementing MFA, you can make sure that the person attempting to enter the protected perimeter are who they claim to be. At the same time, the use of MFA makes it way harder for malicious insiders to access your company’s sensitive information.
It’s also important to have a good password management policy in place. The most basic recommendations include forbidding the use of default and simple passwords and changing passwords upon certain events (say, employee resignation) or after some periods of time (say, every month or every quarter).
2. Limit access whenever possible
Once you managed to make sure that only the right people can get access to your network and critical assets within it, it’s time to think about the access permissions each of your company’s employees has. It’s best to take some technical measures to mitigate insider threats and deploy the so-called least privilege principle when employees only have the exact access level they need to do their job.
But today, more and more companies go even further and deploy a zero trust security model. In a zero trust network, there’s no general protected perimeter that distinguishes trusted insiders from untrusted outsiders. Instead, each critical asset or system is fully protected from both insiders and outsiders, thus mitigating internal and external threats to cyber security.
Such an approach works best for the companies that cooperate actively with third-party vendors and subcontractors. It’s also a great solution for the enterprises with a bring your own device (BYOD) policy in place, allowing their employees to use personal devices for work purposes.
3. Monitor employee activity
User activity monitoring is the basis of many insider threat protection techniques. You need to be able to see what’s going on within your network, in real-time at best. When choosing among the solutions to protect against insider threats in cybersecurity, pick the one that allows to see a particular user session and terminate it if necessary.
Many companies also look towards User and entity behavior analytics (UEBA) as the key to effective threat monitoring and protection against insider threats. Advances in machine learning technologies allow building user profiles that include normal baseline behavior patterns for particular users or roles. Registering activities that deviate from these patterns may help detect malicious insiders and mitigate possible threats at an early stage.
4. Analyze logs and respond to security incidents
Continuous user activity monitoring is meant to give you full visibility across the enterprise network and provide you with detailed data for further analysis. Depending on the user monitoring solution, user activity logs may contain different types of information:
Names of files and applications opened by the user:
- URLs to the visited websites;
- Logged keystrokes;
- Recorded sessions, and more.
The proactive incident response also plays a significant part in building an effective insider threat cyber security program. There’s no point in detecting a malicious action if you’re unable to respond to it properly and, therefore, prevent a data breach from happening.
Look for an insider threat prevention solution that allows you both receiving real-time notifications about the detected security incidents and automating responses to the most common types of incidents. For instance, if the system registers, say, three unsuccessful login attempts, the account a user tried to access will be blocked.
Finally, if you want to be able to analyze all of the logged information on a deeper level, make sure that your insider threat prevention solution supports forensic data export.
5. Pay special attention to third-parties
Remote access control and protection is an essential part of the modern insider threat management program. Today, more and more organizations hire remote employees and grant access to critical corporate resources to third-party vendors and contractors. But, as reported in a 2018 study by the Ponemon Institute, third-party vendors were the cause of nearly 60 percent data breaches.
If granting third-party vendors access to business-critical data, systems, and application is a common practice for your organization, make sure you have an appropriate third-party management solution in place. Leverage all of the above-mentioned tools and practices to protect your corporate data from unauthorized access and use.
If your third-party subcontractors are using a shared account for accessing your corporate network or business applications, it’s preferable to add secondary authorization as an additional protection layer. This way, you’ll be able to clearly associate each session initiated under the shared account with a particular user.
And, finally, make sure that your third-parties are well aware of your organization’s cybersecurity policy and know what cybersecurity rules they must follow.
Conclusion
Insider threats have one of the biggest impacts on enterprise cybersecurity. In order to mitigate the risks related to insider threats, organizations should deploy complex solutions that include monitoring and audit of user activity, granular access and privilege management, and effective incident response.
This article is a contribution from Marcell Gogan. Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.
Source: Latest News on European Gaming Media Network
This is a Syndicated News piece. Photo credits or photo sources can be found on the source article: 5 Best Practices to Prevent Insider Threats in 2019

Latest News
DeepDive launches AI platform to strengthen Enhanced Due Diligence for gaming operators’ anti-money laundering efforts
DeepDive today announced the launch of a revolutionary AI platform for Anti-Money Laundering (AML) compliance teams that conduct Enhanced Due Diligence (EDD) and player investigations.
AML teams at gaming operators face an impossible trade-off, they can either conduct thorough investigations that take days, or fast investigations that may miss critical intelligence. On top of that they have to be able to assess source of funds on customers all over the world. DeepDive combines multi-language web search and global regulatory compliance data checks to extend the reach of EDD. Compliance teams can now sift through the digital ocean of open-source data including public records, corporate filings, court documents, news archives, social media profiles and PEP, sanctions and watchlist data to build customer intelligence.
Using a unique combination of search tools, natural language processing, entity resolution and generative AI, DeepDive enables EDD research to go further and deeper, accessing more sources, in any language or alphabet. Instead of analysts spending hours clicking through search results and manually cross-referencing information, DeepDive’s AI processes hundreds of sources simultaneously and presents EDD reports viewable by timeline, alert type or risk category. Analysts can then interrogate the body of knowledge with the built-in chatbot to get to the heart of the matter, helping them make more informed risk decisions.
The team behind DeepDive is staffed by industry veterans that have previously launched, scaled and exited several fraud investigation and KYC platforms.
“DeepDive addresses the pain points facing compliance teams such as time-intensive manual research, incomplete data, language barriers, false positives, and the challenge of processing vast amounts of information at scale,” said David Pope, COO at DeepDive.
“We’ve now completed a successful six-month beta with MLROs and outsourced EDD providers. DeepDive has helped them build deeper intelligence on high-risk customers from all over the world, in a fraction of the time. Not only are we uncovering intelligence that the manual EDD approach misses, but with the time saved, gaming operators can extend EDD across a wider set of customer transactions.”
DeepDive strengthens EDD by creating multiple search permutations across publicly available data and targeted compliance databases in relevant languages and local search engines. After creating the most exhaustive possible dataset for analysis, entity resolution refines the data pool to remove false positives. Multiple generative AI tools are then used to build a structured intelligence report with full citations to original sources and an audit trail.
The DeepDive report covers personal background, legal issues, financial integrity, compliance history, and key relationships, revealing financial insight, known associates, locations, company linkages, political connections, and criminal activity—all structured for immediate analysis.
The post DeepDive launches AI platform to strengthen Enhanced Due Diligence for gaming operators’ anti-money laundering efforts appeared first on European Gaming Industry News.
Latest News
iRace Media extends partnership with The Hong Kong Jockey Club in Asia
iRace Media has announced the renewal of its long-standing partnership with The Hong Kong Jockey Club (HKJC) ahead of the new season commencing on 7 September.
The partnership will ensure racing fans can continue to experience uninterrupted access to high-quality Hong Kong racing content across Singapore, Malaysia and the wider Asia region. iRace readers and customers will have access to expert guides, results, tips and trusted analysis from one of the world’s premier racing jurisdictions.
Scott Bailey, Commercial Manager, iRace Media says:
“Hong Kong is a benchmark for racing globally; it’s fast, competitive and deeply followed throughout Asia. iRace has collaborated with the Hong Kong Jockey Club for many years now to deliver a trusted experience for racing enthusiasts, and we are thrilled to build on the accuracy, depth and speed that fans have come to expect.”
iRace Media’s extended partnership with the HKJC will explore new ways to enhance the racing experience through its digital platforms, offering real-time insights and driving fan engagement across the Asia region.
Get set for the new season by visiting the iRace website and register for free to access trusted editorial and data-driven racing coverage.
The post iRace Media extends partnership with The Hong Kong Jockey Club in Asia appeared first on European Gaming Industry News.
Latest News
SOFTSWISS Releases Gambling Regulation Directory for iGaming Operators
SOFTSWISS, a global tech provider with over 15 years of iGaming expertise, introduces its Gambling Regulation Directory, a new website section designed to help operators navigate the complex landscape of gambling laws worldwide.
The Gambling Regulation Directory provides a structured overview of the legal status of gambling across multiple countries, both land-based and online. With an interactive regulation table and map (coming soon), operators will gain a clear picture of where gambling is permitted, restricted, or prohibited, and evaluate the opportunities, risks, and compliance requirements for entering or expanding into specific markets.
The country profiles also highlight which activities are allowed or prohibited, outline available information on taxation, fees, and licensing terms, and outline key licence details such as duration and permitted activities. In addition, each profile indicates whether SOFTSWISS products are certified or aligned with local regulations, showing operators where SOFTSWISS solutions are ready for use, and underlining our experience and readiness to support them in these markets.
Practical Value for Industry Stakeholders
- Strategic Planning: A trusted reference point for evaluating opportunities and supporting informed decision-making.
- Efficiency: Centralised, up-to-date regulatory information saves time on research.
- Expert Oversight: SOFTSWISS specialists monitor developments to ensure the Directory reflects the latest licensing and legislative changes.
“At SOFTSWISS, we provide a trusted foundation for launching and growing iGaming brands. With the introduction of the Gambling Regulation Directory, we stay true to our goal of offering advanced solutions and empowering operators with the knowledge and insights they need to grow responsibly and sustainably in highly regulated markets. Building on this commitment, our certified software meets the requirements of multiple national regulators, enabling operators to confidently enter new markets with full compliance,” added Olga Resiga, Chief Business Development Officer at SOFTSWISS.
The iGaming Regulation Directory is an evolving resource. Not all country profiles are available yet, but the SOFTSWISS team is committed to updating the Directory regularly with new jurisdictions and the latest regulatory changes.
At SBC Lisbon 2025, Stand B160, visitors will have the opportunity to explore the new Gambling Regulation Directory and exchange views on industry trends with the SOFTSWISS Team.
About SOFTSWISS
SOFTSWISS is an international technology company with over 15 years of experience in developing innovative solutions for the iGaming industry. SOFTSWISS provides comprehensive software for managing iGaming projects. The company’s product portfolio includes the Casino Platform, the Game Aggregator with over 35,000 casino games, Affilka Affiliate Platform, the Sportsbook Platform and the Jackpot Aggregator. The expert team, based in Malta, Poland, and Georgia, counts over 2,000 employees.
The post SOFTSWISS Releases Gambling Regulation Directory for iGaming Operators appeared first on European Gaming Industry News.
-
Latest News3 months ago
HIPTHER Movement Launched: Fitness Community & Summer Run-Off Challenge Powered by GameOn
-
Latest News3 months ago
Brand-new projects debuting at iGB L!VE: Casino&You and Win&You Partners!
-
Latest News3 months ago
New Resort & Casino Selects IvedaAI for Intelligent Video Surveillance Ahead of Grand Opening
-
Latest News1 month ago
Light & Wonder to Participate in the 2025 Australasian Gaming Expo
-
Latest News4 weeks ago
ReferOn Shortlisted for Acquisition & Retention Partner of the Year at SBC Lisbon 2025
-
Latest News1 month ago
Gavin Hamilton Joins Sports & Wellbeing Analytics as Chairman to Accelerate Global Expansion
-
Latest News2 months ago
2025 PUBG MOBILE WORLD CUP KICKS OFF WITH GROUP DRAW AHEAD OF ESPORTS WORLD CUP
-
Latest News2 months ago
HIPTHER Community Voices: Interview with the CEO and co-founder of Nordcurrent Victoria Trofimova
You must be logged in to post a comment Login