- My favorite Kindle accessory seriously upgraded my reading experience (and it only costs $20)
- This MagSafe charger that looks like a macaron is my new favorite travel accessory
- Does your kid need a new tablet? Get a kids' tablet for as low as $85 on Amazon
- This battery floodlight camera is just what my dark yard needed (and it's on sale)
- Samsung Galaxy S25 Ultra hands-on: One day later, I'm slowly becoming an AI phone believer
Tagged Files as a Road to Insider Threats
The insider threat is any individual within community who does something against such surrounding even being used for sabotage, diversion, espionage and the other purposes, so far. On the other hand, the business environment cannot be yet assured completely as those relying on, say, a corporate security deal with relatively questionable effective and still quite expensive defense opportunity that might demonstrate both – some pluses and minuses at the same glance. Indeed, the corporate security is correlated with the physical, cyber and financial assurance, but even with such risk management it can show a lot of weaknesses and drawbacks. In other words, the corporate security is an area which seeks a plenty of good ideas and innovations in order to improve its effectiveness and trustworthiness, so far. The good remark with that approach is the corporate security bosses could try to adopt, if already not, some of the best practices being applied with defense & intelligence communities where everything that can be tracked is traced and in such a fashion, it is clear that some kinds of the innovative methodologies are needed.
The insider risk can access some organization even if there is pre- in- and post- employment screening procedures and if on the espionage task those bad actors might take out extremely sensitive information from such a place. Apparently, those findings could be in a digital shape and once being saved on some removable memory device any footage of such a committed crime could be lost only if some sort of the preventive measures are not applied. Next, a fully trickery question with such a concern could be how to track such critical data being stolen through the insider risk operation and the answer to that wondering is all files and folders being used among someone’s virtual space should be tagged and if they are found anywhere else that could be a valid clue for proving something much serious which could be a terrorist or transnational organized crime spying campaign, so far.
Also, if there is a certain information leakage from any communities such sort of the procedure including stolen information detection could be introduced even into a business ambient as once marked data could be later detected on someone’s else hardware suggesting that some data leakage exists and those actors doing such sort of the exchange will be correlated and investigated in order to via corporate security service warn the authorities about such sort of the activities within some spot.
In other words, if the corporate security managers are with such a skill they even if pre-employment background screening allowed an access to someone harmful to the organization anyone from those employees or community members could be uncovered as those sorts of the footage will be left because any single file or folder will get an unbeatable stamp to such documents belonging to that organization which can support being the owners of such digital asset to protect their interests and offer much more secure condition to everyone, so far.
About The Author
Milica D. Djekic is an Independent Researcher from Subotica, the Republic of Serbia. She received her engineering background from the Faculty of Mechanical Engineering, University of Belgrade. She writes for some domestic and overseas presses and she is also the author of the books “The Internet of Things: Concept, Applications and Security” and “The Insider’s Threats: Operational, Tactical and Strategic Perspective” being published in 2017 and 2021 respectively with the Lambert Academic Publishing. Milica is also a speaker with the BrightTALK expert’s channel. She is the member of an ASIS International since 2017 and contributor to the Australian Cyber Security Magazine since 2018. Milica’s research efforts are recognized with Computer Emergency Response Team for the European Union (CERT-EU), Censys Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation (ECCSA). Her fields of interests are cyber defense, technology and business. Milica is a person with disability.