{"id":122557,"date":"2022-10-06T09:00:00","date_gmt":"2022-10-06T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=122557"},"modified":"2023-07-21T14:31:20","modified_gmt":"2023-07-21T21:31:20","slug":"microsoft-publishes-new-report-on-holistic-insider-risk-management","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/06\/microsoft-publishes-new-report-on-holistic-insider-risk-management\/","title":{"rendered":"Microsoft publishes new report on holistic insider risk management"},"content":{"rendered":"\n
The risk landscape for organizations has changed significantly in the past few years. The amount of data captured, copied, and consumed is expected to grow to more than 180 zettabytes through 2025.1<\/sup> Traditional ways of identifying and mitigating risks don\u2019t always work. Historically, organizations have focused on external threats; however, risks from within the organization can be just as prevalent and harmful. These internal risks include unprotected and ungoverned data, accidental or intentional data oversharing, as well as the risks for failing to meet ever-changing regulations. Not to mention, with more than 300 million people working remotely, data is being created, accessed, shared, and stored outside of the traditional borders of business.<\/p>\n\n\n\n Core to a security team\u2019s mission is protecting the company\u2019s assets, especially its data. Strong data protection<\/a> requires securing the most sensitive or critical data, preventing that data from leaving the organization, and managing potential risks inside and outside of your environment.<\/p>\n\n\n\n And managing internal risks can be challenging because it requires analyzing millions of daily signals to detect potentially risky user actions that may lead to a data security incident. For example, what confidential files are your users sharing or accessing? Are users sharing sensitive files externally? Are they downloading files to unapproved devices or uploading them to unapproved locations? All the while, you must balance security controls and productivity, and ensure user privacy is built into your program.<\/p>\n\n\n\n To be effective in addressing insider risks, it\u2019s critical that organizations start thinking about how and why they should be implementing a holistic data protection strategy across their entire organization that encompasses people, processes, training, and tools. At Microsoft, we transitioned from a fragmented insider risk management approach to one in which we addressed it holistically by taking a more comprehensive approach, getting more buy-in from organizational leadership, and making sure user privacy is built in from the get-go.<\/p>\n\n\n\n Following our own transition, Microsoft wanted to better understand how organizations are approaching insider risk management, specifically how some of these security and compliance teams were thinking about insider risk management holistically. <\/em>Today we\u2019re publishing our first Microsoft report specifically addressing insider risk, \u201cBuilding a Holistic Insider Risk Management program<\/a>.\u201d<\/p>\n\n\n\n This Microsoft-commissioned report lays out several new insights about how organizations go from a fragmented approach to insider risk management to a holistic one, addressing potential risks from multiple lenses as part of a greater data protection strategy, with cross-leadership buy-in. For example, we found that more than 90 percent of holistic organizations believe privacy controls should be used in the early stages of investigations. Holistic organizations also get more buy-in on their risk programs from other departments, like legal, HR, or compliance teams, which is critical to building a culture of security. Furthermore, they put a greater emphasis on training with 92 percent agreeing that \u201ctraining and education are vital to proactively address and reduce insider risks,\u201d compared with 50 percent of fragmented organizations.<\/p>\n\n\n\n The report also shares best practices for organizations who endeavor to approach insider risk management more holistically and build a program that fosters trust, empowers users, and makes privacy a priority.<\/p>\n\n\n\n You can read the full report here<\/a>.<\/p>\n\n\n\n Learn more about Microsoft Purview<\/a>.<\/p>\n\n\n\n Learn more about insider threats<\/a> and the types of threats possible.<\/p>\n\n\n\n To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\nLearn more<\/h2>\n\n\n\n