7 Unusual Behaviors That Indicate Security Breaches

Breaches create outliers. Identifying anomalous activity can help keep firms in compliance and out of the headlines.
March 12, 2014

Outlying Behavior

Here is a rather uncontested statement: In the world of cyber security there are many things that can go wrong.

Some breaches are intentional, other accidental. A case in which an employee unwittingly discloses confidential information, or is working from an infected machine may look similar to the actions of employee who has gone rogue by uploading or downloading inappropriate data.

Regardless of the cause of the behavior, determining if a behavior is normal or not normal is important to catching a variety of security breaches.

Skyhigh Networks compiled real-world examples of behaviors that security teams identified as several standard deviations outside of normal activity.

Wall Street & Technology encourages readers to engage in spirited, healthy debate, including taking us to task. However, Wall Street & Technology moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Wall Street & Technology further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
< Previous 1 2 3 4 5 6 7 8 Next > 

< Previous 1 2 3 4 5 6 7 8 Next >