Definition
Programs that help individuals and organizations protect their Internet connection or mobile phones and other telecommunications devices from vulnerability to hacking, phishing, spamming or other offences, such as their identity or tools being used by others to commit a crime. Security measures include use of strong passwords; activating the computer's firewall; installing and updating anti-virus/malware and spyware detection software; avoiding unsolicited emails and suspicious text messages; avoiding public Wi-Fi; protecting personal information on social media; shutting down computers when they aren't being used; locking mobile devices; and encrypting confidential data to keep it secure. Bank and credit card statements should be promptly reviewed for suspicious activity. Organizations may also face malicious (or unintentional) threats from current or former employees, vendors, contractors, visitors or others trusted by the organization with access to their facilities, equipment or systems. This may negatively impact the integrity, confidentiality, and availability of the organization, its data, personnel, facilities and associated resources. Effective insider threat mitigation programs are prevention-focused and can detect improper or illegal actions, assess threats to determine levels of risk, and implement solutions to mitigate potential consequences.
URL Name
FN-1500-1750
Third Level Code
FN-1500
Taxonomy Code
FN-1500.1750
Parent Code
FN-1500
Family Code
F
Second Level Code
FN
Fourth Level Code
FN-1500-1750
Use References
Insider Threat Mitigation Plan Development
Publication Status
Draft