Actions by Insider Threats That Lead to Data Breaches
Автор: 5-Minute Lessons by Victor
Загружено: 2025-05-20
Просмотров: 113
By the end of the video, learners will be able to
1. Define the three types of employee actions that can lead to data breaches;
2. Identify real-world examples of insider threats and classify them based on given scenarios; and
3. List down and discuss the measures an organization should implement to reduce the risk of insider threats.
0:00 🎬 Introduction
0:11 🧠 Define Insider Threats
0:36 ⚠️ Innocent Actions - The Unintentional Mistakes
0:43 Examples of Innocent Actions
1:33 🚨 Negligent Actions - Ignoring Best Practices
2:02 Examples of Innocent Actions
3:05🕵️♂️ Malicious Actions - Intentional Harm from Within
3:15 Examples of Malicious Actions
4:00🛡️ How to Stop Insider Threats
4:59💡 Additional Prevention Strategies
5:46 📚 References
5:52 🔔 Subscribe
Here are the helpful references for this material:
🔗 Catalan, C. (2025, April 17). How To Detect & Prevent Malicious Insider Threats. Teramind. Retrieved May 20, 2025, from https://www.teramind.co/blog/maliciou...
🔗 ESET. (2017, May 26). 3 Types of Employees that can Cause a Data Breach. Retrieved May 20, 2025, from https://www.welivesecurity.com/2017/0...
🔗 Fortinet, Inc. (n.d.). What Is an Insider Threat? Definition, Types, and Prevention. Retrieved May 20, 2025, from https://www.fortinet.com/resources/cy...
🔗 Skebaite, A. (2025, February 19). Insider threats: Examples and prevention. Retrieved May 20, 2025, from https://nordvpn.com/blog/insider-thre...
If you find the video helpful, please like, share, comment, and consider subscribing. Thanks for your time!
#cybersecurity #databreach #informationsecurity #insiderthreats #cybersecurityawareness

Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: