Monitoring user activity to combat insider threats: best practice

Fraud, intellectual property theft and lost customer information: these security threats can all lead to financial loss and could come from inside the business. For many organisations, user activity monitoring is one tool that can combat insider threats, which could stem from privileged users, third parties with authorised network access and internal accounts that have been hacked. This white paper discusses the landscape of insider threats, as well as best practices for detecting suspicious activity and keys to developing monitoring capability, including: - Centralising collection and storage of user logs; - Tracking high-risk users for malicious activity.

Provided by: HP US Topic: Security Date Added: Sep 2011 Format: PDF

Find By Topic