{"id":7248,"date":"2025-03-28T12:32:07","date_gmt":"2025-03-28T12:32:07","guid":{"rendered":"https:\/\/dssi.pt\/news\/"},"modified":"2026-01-21T12:04:05","modified_gmt":"2026-01-21T12:04:05","slug":"news","status":"publish","type":"page","link":"https:\/\/dssi.pt\/en\/news\/","title":{"rendered":"News"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7248\" class=\"elementor elementor-7248 elementor-3520\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<header class=\"elementor-section elementor-top-section elementor-element elementor-element-425ae4c elementor-section-height-min-height elementor-section-full_width elementor-section-height-default elementor-section-items-middle wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"425ae4c\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_mouse&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29e108a\" data-id=\"29e108a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f328533 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f328533\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">News  <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28193ed2 elementor-widget elementor-widget-heading\" data-id=\"28193ed2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><b>Here you'll find the latest updates, news and most relevant events on technology!<\/b><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/header>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24526676 elementor-section-height-min-height elementor-section-items-top elementor-section-content-top elementor-section-boxed elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"24526676\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2314203b\" data-id=\"2314203b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cb2549 elementor-widget elementor-widget-text-editor\" data-id=\"9cb2549\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Stay on top of the main events, innovations and trends in the market, as well as updates on projects and initiatives.  <br><\/b><b>Follow us so you don&#8217;t miss any news!<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-3e2adad e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"3e2adad\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c56abed e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"c56abed\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-65d76fa e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"65d76fa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-046b594 elementor-widget elementor-widget-image\" data-id=\"046b594\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"201\" height=\"86\" src=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/11\/3-cyberhaven-1.png\" class=\"attachment-large size-large wp-image-12095\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-455c764 elementor-widget elementor-widget-text-editor\" data-id=\"455c764\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When most security teams think about insider risk, they immediately picture the malicious actor: the disgruntled employee downloading a customer list before quitting, or the rogue developer leaking source code to a competitor. Those scenarios are real and dangerous, but while malicious insider activity gets the most attention, the greater and more persistent risk comes from well-intentioned employees whose routine actions and blind spots accidentally put sensitive data at risk \u2014 often without anyone realizing it.<\/p><div class=\"grid-layout-12\"><div id=\"w-node-a475c394-587d-b141-79eb-378e6a8eb196-e1aa7e8a\" class=\"longform_rtf w-richtext\"><p>Insider risk isn\u2019t just about intent. It\u2019s about context, access, and misaligned incentives. And while most organizations think they have \u201cgood policies\u201d in place, the real risk lives in the space between written rules and lived behaviors. That\u2019s where visibility gaps emerge and where insider threats thrive.<\/p><p>In this post, we\u2019ll break down the lesser-known, but incredibly common,\u00a0insider risk\u00a0gaps that organizations tend to overlook. If your\u00a0insider risk program\u00a0feels solid on paper, consider this a reality check. What follows isn\u2019t about bad actors or headline-worthy breaches, but the everyday patterns of work that quietly create exposure long before anyone realizes it.<\/p><div id=\"offboarding-the-soft-underbelly-of-insider-risk\"><p><strong>Offboarding: The Soft Underbelly of Insider Risk<\/strong><\/p><p>Let\u2019s start with one of the most obvious, but least consistently executed, vulnerabilities:\u00a0employee offboarding. Many companies don\u2019t immediately revoke access when someone leaves. Maybe HR notifies IT a day late. Maybe it\u2019s a slow Friday and the admin queue doesn\u2019t get touched until Monday. Maybe a contractor wraps up a project and their credentials just fall through the cracks.<\/p><p>Even a short delay gives an insider the window they need to exfiltrate critical files, scrape email threads, or clone repositories. And in hybrid environments where employees can work from anywhere, it\u2019s not like they need to be in the office to execute their plan.<\/p><p>The issue here isn\u2019t just technical, it\u2019s procedural. Offboarding often relies on a chain of handoffs across teams, tools, and systems that aren\u2019t designed to stay perfectly in sync. Without centralized visibility, security teams are left assuming access has been revoked without being able to confirm that it truly has everywhere it matters.<\/p><\/div><div id=\"role-creep-when-access-expands-but-never-contracts\"><p><strong>Role Creep: When Access Expands but Never Contracts<\/strong><\/p><p>It happens all the time. An employee gets temporary access to a sensitive system or dataset for a project. The project ends. But no one ever removes the access.<\/p><p>Multiply that across dozens of projects, hundreds of users, and years of growth, and you end up with\u00a0<strong>role creep\u00a0<\/strong>\u2014 users accumulating access they no longer need, often to data that\u2019s far outside their current responsibilities.<\/p><p>Over time, this creates a bloated, over-permissioned environment where a single compromised or malicious insider has reached far beyond what their job should allow. The scariest part? Most companies have no easy way to map access patterns against actual job function. It\u2019s not just about who\u00a0<em>can<\/em>\u00a0access sensitive data. It\u2019s about who\u00a0<em>should<\/em>.<\/p><p>Role creep doesn\u2019t turn employees malicious. It turns ordinary trust into latent risk by quietly handing out more access than anyone intended.<\/p><div class=\"cyberhaven-inline-ad\"><a class=\"cyberhaven-ad-link\" href=\"https:\/\/www.cyberhaven.com\/resources\/lp-eb-dlp-for-dummies\" target=\"_blank\" rel=\"noopener\" data-ad-id=\"inline_1768990328365_2_eqx64aduv\" data-campaign=\"dlp-for-dummies-ebook-inline\" data-tracking-id=\"dlp-dummies-ebook-inline\" data-ad-type=\"inline\"><picture><source srcset=\"https:\/\/cdn.prod.website-files.com\/64deefeac57fbbefc32df53d\/68a42f0956f617404fc0c2d4_dlp-dummies-inline-mobile-600x150.avif\" media=\"(max-width: 767px)\" \/><\/picture><\/a><\/div><\/div><div id=\"cloud-collaboration-tools-the-unseen-exit-route\"><p><strong>Cloud Collaboration Tools: The Unseen Exit Route<\/strong><\/p><p>Not long ago, collaboration was relatively contained. Files lived on shared servers. Documents moved through email. Infrastructure teams had clear control over where data went and how it was shared.<\/p><p>Today, that model is gone. Slack, Google Drive, Dropbox, Notion, and GitHub are the lifeblood of modern work, and they\u2019ve fundamentally changed how information moves inside organizations. Not because they\u2019re insecure, but because data now flows freely across tools and users in ways most teams struggle to fully monitor.<\/p><p>Security teams often don\u2019t have deep visibility into what users are doing in these tools. Sensitive files can be shared with personal accounts, exposed to public links, or downloaded in bulk \u2014 all without triggering traditional\u00a0DLP\u00a0rules. Chat messages can contain customer data, pricing information, screenshots, credentials, and more. And in many cases, none of it is logged, flagged, or correlated with broader user behavior.<\/p><p>Collaboration platforms blur the line between communication and storage. As conversations turn into files, links, and shared artifacts, sensitive data quietly proliferates; copied, cached, and stored across multiple tools long after its original context is gone. Without monitoring these platforms for insider behavior, organizations miss one of the fastest-growing vectors for silent data loss.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4da8be e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"b4da8be\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d70733 elementor-widget elementor-widget-heading\" data-id=\"6d70733\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Biggest Insider Risk Gaps You Probably Haven\u2019t Thought About<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a48af6 elementor-widget elementor-widget-text-editor\" data-id=\"6a48af6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6><em><strong>By: Code Padula, Sales Engineer<\/strong><\/em><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8096710 elementor-widget elementor-widget-text-editor\" data-id=\"8096710\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Personal Devices and Unmanaged Endpoints<\/strong><\/p><p>Even in companies that issue corporate laptops, employees still use personal phones, tablets, or home machines to check emails, open Slack threads, or view dashboards. And for contractors or freelancers, unmanaged devices are often the default.<\/p><p>That creates a serious blind spot. Even if your main endpoint protection solution is doing its job, you can\u2019t enforce policy or capture telemetry on personal or BYOD endpoints. If a user downloads sensitive documents to their home desktop or screenshots internal tools on their iPhone, you won\u2019t know. And once that data leaves your visibility layer, it\u2019s gone.<\/p><p>Hybrid work has made this problem worse. Employees are logging in from cafes, co-working spaces, shared home offices, and doing real work on devices you don\u2019t control. Without endpoint visibility, insider risk becomes almost impossible to quantify, let alone contain.<\/p><div id=\"print-copy-screenshot-the-analog-loophole\"><p><strong>Print, Copy, Screenshot: The Analog Loophole<\/strong><\/p><p>Security teams spend millions on digital controls, but forget about the oldest data exfiltration tools in the book:\u00a0<strong>printer trays, clipboard copy, and camera rolls<\/strong>.<\/p><p>Yes, people still print sensitive documents. Yes, they still take pictures of their screens. And yes, they still copy and paste information from secure systems into personal files, unmanaged notes, or third-party platforms.<\/p><p>These are analog behaviors in a digital world and most organizations have no answer for them.\u00a0Traditional DLP\u00a0can\u2019t detect when someone pulls out their phone. It won\u2019t trigger an alert when someone uses the Snipping Tool or grabs content through Command + C. Yet these actions are incredibly common and often go unnoticed until long after the fact.<\/p><p>Your IRM strategy needs to address the human-device interaction layer. That means visibility into screen-level behavior, clipboard activity, and print logs, especially in roles that handle sensitive data daily.<\/p><\/div><div id=\"the-insider-threat-that-isnt-malicious\"><p><strong>The Insider Threat That Isn\u2019t Malicious<\/strong><\/p><p>Here\u2019s a hard truth:\u00a0<strong>most insider incidents aren\u2019t malicious<\/strong>. They\u2019re caused by smart, well-meaning employees who are trying to do their jobs, fast.<\/p><p>They email themselves files to work from home. They upload documents to a personal cloud account so they can collaborate with someone who doesn\u2019t have internal access. They store passwords in plaintext because it\u2019s \u201cjust easier.\u201d They take screenshots of a dashboard to paste into a client deck.<\/p><p>These actions don\u2019t come from intent to harm. But they expose sensitive data in ways that traditional policies were never built to handle. And the irony is, if these behaviors become normalized (e.g. if no one gets flagged, warned, or educated) employees start assuming they\u2019re okay.<\/p><p>That\u2019s how risk becomes culture.<\/p><\/div><div id=\"get-ahead-of-the-risk-before-it-becomes-reality\"><p><strong>Get Ahead of the Risk Before It Becomes Reality<\/strong><\/p><p>All of these gaps stem from the same root problem: visibility. You can\u2019t address insider risk if you can\u2019t see how data moves, how people interact with it, and what \u201cnormal\u201d actually looks like.<\/p><p>In practice, this often shows up quietly, like a former employee whose access lingered just long enough to download a shared drive, or a well-meaning engineer who synced sensitive documents to a personal workspace to work from home.<\/p><p>Effective IRM programs close this gap by establishing behavioral baselines, tracking\u00a0data lineage, correlating access with real user activity, and surfacing anomalies in context. More importantly, they recognize that insider risk isn\u2019t a static set of alerts. It&#8217;s an evolving challenge shaped by how people work, collaborate, and change roles over time.<\/p><p>Organizations that haven\u2019t mapped these gaps aren\u2019t just exposed \u2014 they\u2019re operating without a clear picture of their risk.<\/p><p>You don\u2019t need to wait for an incident to start closing them. And you don\u2019t need to do everything at once. Start with visibility. Pick a single data flow, a high-risk role, or one department. Map how data moves, who touches it, and where risk accumulates. From there, insider risk becomes something you can understand and deliberately improve.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42cdb95 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"42cdb95\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cyberhaven.com\/blog\/hidden-insider-risk-gaps\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7879f7 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a7879f7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9e1af6c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"9e1af6c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-82dc470 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"82dc470\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be89254 elementor-widget elementor-widget-image\" data-id=\"be89254\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"201\" height=\"86\" src=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/11\/4-k7security-1.png\" class=\"attachment-large size-large wp-image-12087\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd18770 elementor-widget elementor-widget-text-editor\" data-id=\"bd18770\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The call comes at 2 a.m. It\u2019s your chief financial officer, and the tone of their voice conveys immediate alarm. The organization\u2019s network is locked down, systems are inaccessible, and a ransom demand is flashing across every screen. This scenario is more than a fictional thriller; it reflects the stark reality for business leaders globally grappling with escalating cyber threats. With the average cost of a data breach reaching $4.45 million, the financial and operational stakes are immense. Business continuity and reputation hang in the balance.<\/p><p>This is the nightmare moment every executive fears. It\u2019s a crisis that forces an urgent question: What if your employees were your strongest line of defense rather than your organization\u2019s most vulnerable link? Today, the paradigm of business cybersecurity is shifting\u2014technology remains essential, but the human element is consistently targeted by sophisticated adversaries. Investing in cybersecurity training for employees is no longer just a best practice; it is a strategic imperative for business resilience and sustained competitive advantage.<\/p><p><strong>The Uncomfortable Truth About Your Biggest Vulnerability<\/strong><\/p><p>Organizations spend billions of dollars each year deploying advanced firewalls, endpoint detection solutions, and cyber risk management software. Security awareness is a common board-level agenda item, and CISOs typically highlight technical countermeasures in executive meetings. Yet, despite massive investments in such security training programs and infrastructure, an uncomfortable truth persists: the majority of cyber incidents involve a human element.<\/p><p><strong>Data Reveals the Human Factor<\/strong><\/p><p>Industry research shows that approximately 60% of all security breaches result from human error or manipulation. Employees remain susceptible to phishing training shortfalls, poorly understood security policies, and social engineering scams. From clicking on dangerous email attachments to falling victim to business email compromise attacks, employee cyber education gaps play directly into attackers\u2019 hands.<\/p><p>Today\u2019s threat actors aren\u2019t just probing firewalls; they\u2019re engineering targeted attacks to exploit loyal, distracted, or uninformed staff. This reality underscores the renewed urgency of security awareness and employee training, making robust security education and cybersecurity awareness training ROI for executives a critical discussion point at every board meeting.<\/p><p><strong>The Existential Threat to Small and Midsize Businesses<\/strong><\/p><p>Large enterprises might command headlines, but SMBs are often at greater risk. Attackers identify small and midsize businesses as lower-hanging fruit, perceiving lighter defenses and slimmer budgets. Data shows 78% of SMB leaders worry a significant cyberattack could put them out of business. With so many small business owners and SMB executives seeking an employee security training implementation guide for SMBs, practical, role-based security training implementation is now core to business survival.<\/p><p>This stark reality creates a paradox: The very employees who drive growth and innovation can, without effective cyber resilience training and information security awareness, unwittingly become the weakest link. The gap between technology investment and security education is a vulnerability that businesses cannot continue to ignore.<\/p><p><b>The Hidden Price Tag of Inaction<\/b><\/p><p>Overlooking cybersecurity training for employees comes with mounting and often underestimated consequences. Measuring the effectiveness of your cybersecurity training programs and their KPIs against potential breach costs reveals a staggering disparity between investment and potential loss.<\/p><p><b>A Spectrum of Costs<\/b><\/p><p>Breach response costs vary by what went wrong\u2014but consistently, costs skyrocket when the human element is involved:<\/p><ul><li aria-level=\"1\"><b>Insider Errors:<\/b>\u00a0Employee mistakes, such as misconfigured cloud storage, ignoring insider threat prevention protocols, or succumbing to phishing emails, lead to average remediation costs of $3.62 million per event.<\/li><li aria-level=\"1\"><b>Malicious Attacks:<\/b>\u00a0Deliberate insider actions are even more harmful. These attacks, often involving privileged users, average $4.92 million, due in part to their complexity and the extensive access insiders possess.<\/li><\/ul><p>But the financial hit is only the beginning.<\/p><p><b>Reputational Damage and Regulatory Fines<\/b><\/p><p>Failing to prioritize security culture or cyber risk management doesn\u2019t just result in financial loss; it damages customer trust and brand reputation, resulting in customer attrition, competitive loss, and negative media exposure. Regulatory failure compounds the pain: frameworks such as GDPR and CCPA can levy multimillion-dollar fines for breaches, especially when security education and compliance evidence is lacking.<\/p><p><b>The Competitive Disadvantage<\/b><\/p><p>Security breaches now differentiate winners from losers in every market segment. Forward-thinking companies that deploy effective cybersecurity training programs and invest in cyber resilience training gain trust from clients, partners, and regulators. In contrast, those ignoring security awareness find themselves at a disadvantage when competitors demonstrate stronger breach prevention training, transparency, and regulatory compliance.<\/p><p>Some organizations, however, have rewritten the script: by treating human error cybersecurity prevention strategies for business as an investment\u2014not an afterthought\u2014they turn employees into organizations\u2019 greatest security assets.<\/p><p><b>The Great Reversal: Employees as Your Human Firewall<\/b><\/p><p>Reframing employees as contributors to a \u201chuman firewall\u201d marks a strategic transformation in security posture. It\u2019s about empowering staff with ongoing, relevant employee cyber education that blends technical and behavioral change, ultimately supporting your wider business cybersecurity objectives.<\/p><p><b>The Staggering ROI of Security Awareness Training<\/b><\/p><p>Data shows that investing in cybersecurity training for employees is among the highest-ROI actions a business can take:<\/p><ul><li aria-level=\"1\"><b>Large Enterprises:<\/b>\u00a0For major organizations, cybersecurity awareness training ROI for executives is validated by studies showing up to\u00a0<strong>562% ROI<\/strong>, meaning every dollar spent pays for itself many times over by avoiding the cost of just one breach.<\/li><li aria-level=\"1\"><b>SMBs:<\/b>\u00a0Security awareness and training deliver an average\u00a0<strong>ROI of 69%, proving highly cost-effective even for small business leaders facing<\/strong>\u00a0resource constraints.<\/li><\/ul><p>When measured using effectiveness\u00a0<strong>KPIs<\/strong>\u00a0(such as reduced phishing click rates, increased incident reporting, and lower incident response times), employee security training programs\u2019 effectiveness measurement KPIs reveal clear, quantifiable benefits.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5af724b e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"5af724b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82c1ecc elementor-widget elementor-widget-heading\" data-id=\"82c1ecc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Human Firewall: Why Cybersecurity Training for Employees Is Your Best Defense<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f4f328 elementor-widget elementor-widget-text-editor\" data-id=\"9f4f328\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6><em><strong>By: Anirban Roy<\/strong><\/em><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce9d45a elementor-widget elementor-widget-text-editor\" data-id=\"ce9d45a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Typical Objections and Counter Strategies<\/b><\/p><ol><li aria-level=\"1\"><b>Budget Limitations<\/b><ul><li aria-level=\"2\">Frame the case as an investment, not an expense. Highlight the ROI of security awareness and compare the cost of training to even a single breach event.<\/li><li aria-level=\"2\">Start with a high-risk group pilot to demonstrate value and build momentum for broader funding.<\/li><\/ul><\/li><li aria-level=\"1\"><b>Lack of Time<\/b><ul><li aria-level=\"2\">Introduce micro-learning modules, allowing employees to complete material in digestible segments. Consistent, regular exposure trumps lengthy annual sessions.<\/li><\/ul><\/li><li aria-level=\"1\"><b>Executive or Team Resistance<\/b><ul><li aria-level=\"2\">Connect cybersecurity training outcomes to board-level KPIs, demonstrate strategic advantage, risk mitigation, and competitive differentiation through security culture initiatives.<\/li><\/ul><\/li><li aria-level=\"1\"><b>Change Fatigue<\/b><ul><li aria-level=\"2\">Position this as a transformational move: not a one-off project, but a strategic evolution necessary to future-proof against increasingly sophisticated AI-powered threats.<\/li><\/ul><\/li><\/ol><p><b>The Strategic Crossroads: Decision Point for Today\u2019s Leaders<\/b><\/p><p>The current cyber landscape presents a clear strategic choice: Become a proactive leader in security culture or risk reacting to potentially devastating incidents. Competitors who prioritize cybersecurity training for employees and deploy breach prevention training are building a business advantage rooted in customer trust and operational continuity.<\/p><p>Failing to act means not just facing possible regulatory non-compliance and loss of market share but risking the very survival of your organization\u2014particularly true for smaller businesses with slimmer margins for error.<\/p><p><b>Your Next Chapter: Five Immediate Steps to Bolster Security Awareness<\/b><\/p><p>To transition courageously and effectively into a security-first culture, here are five actionable, high-impact steps for business executives, SMB leaders, and CISOs:<\/p><ol><li aria-level=\"1\"><b>Host an Executive Security Briefing:<\/b>\u00a0Bring together the C-suite and business unit leaders to examine cutting-edge trends, the ROI of cybersecurity awareness training for executives, and the risk landscape.<\/li><li aria-level=\"1\"><b>Commission a Real-World Phishing Simulation:<\/b>\u00a0Engage with a cyber resilience training vendor or your security team to run a simulation and baseline employee susceptibility.<\/li><li aria-level=\"1\"><b>Appoint a Security Program Champion:<\/b>\u00a0Choose a respected internal leader to own the employee training process, manage program momentum, and report progress to the board.<\/li><li aria-level=\"1\"><b>Launch a Departmental Pilot:<\/b>\u00a0Start with a high-impact team such as finance or operations. Document pilot results on KPIs like reduction in successful phishing attempts and improved incident reporting.<\/li><li aria-level=\"1\"><b>Integrate Security Awareness Into Onboarding:<\/b>\u00a0Make security education a foundational part of your onboarding journey for all new hires, setting expectations and organizational standards from day one.<\/li><\/ol><p><b>Long-Term Vision: Embedding Security into Your Business DNA<\/b><\/p><p>Success is not measured solely by technology, but by the organization\u2019s collective ability to recognize, resist, and recover from evolving threats. By investing in business cybersecurity and integrating employee security training as a core business strategy, you earn customer trust, regulatory goodwill, and a sustained market advantage.<\/p><p>Security is not a one-time investment, but an ongoing commitment. The sooner you begin, the greater the benefits; financially, culturally, and competitively.<\/p><p><b>Final Inspiration: From Vulnerability to Strength<\/b><\/p><p>The journey to cyber resilience begins with the recognition that your people are both your greatest risk and your greatest shield. With the right cybersecurity training for employees, the so-called weakest link becomes your most robust human firewall. Whether you lead a global enterprise or a local SMB, now is the time to invest in security awareness, transform your workforce, and secure your organization\u2019s future.<\/p><p><b>Take action today, because the organizations that move first gain a lasting advantage.<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ed2881 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5ed2881\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/blog.k7computing.com\/why-cybersecurity-training-fails-executives\/?utm_source=Webpage&#038;utm_medium=Blog_Homepage&#038;utm_campaign=Blog_Promo\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8ac347 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"a8ac347\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0b63df3 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"0b63df3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f37a15 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2f37a15\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6df06a6 elementor-widget elementor-widget-image\" data-id=\"6df06a6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"201\" height=\"86\" src=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/11\/13-tenable.png\" class=\"attachment-large size-large wp-image-12117\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2854f1b elementor-widget elementor-widget-text-editor\" data-id=\"2854f1b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"176\" data-end=\"231\">In this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahead.<\/p><p><strong>1 &#8211; AI won\u2019t spawn new attack vectors in 2026<\/strong><\/p><p>Is artificial intelligence (AI) about to unleash a wave of never-before-seen cyber attacks? Not quite. While the hype machine might suggest otherwise, the reality for 2026 is grounded in a familiar truth: most bad actors are opportunists looking for low-hanging fruit. They don\u2019t want to reinvent the wheel. Rather, they\u2019re looking for easy wins that yield big gains with minimal effort.\u00a0<\/p><p>\u201cAI is not a magic wand; it supercharges traditional attack methods,\u201d Tenable Chief Product Officer Eric Doerr says. \u201cIt will drive down the cost of attack generation and increase the volume, and it might even find a new zero day or two, but it\u2019s not finding novel attack techniques.\u201d<\/p><p>In response, cyber teams should double down on\u00a0foundational cybersecurity practices\u00a0to combat these high-volume, AI-enhanced threats.<\/p><p>As Doerr explains: &#8220;At the end of the day, cybersecurity is a numbers game and AI broadens attackers\u2019 canvas. Basic\u00a0cyber hygiene\u00a0remains the best defense.&#8221;\u00a0<\/p><p><em><strong>Prediction:\u00a0<\/strong>In 2026, as attackers increase their use of AI, cyber attacks will grow in number and become less expensive to launch. However, attackers won\u2019t leverage AI to create new attack vectors.\u00a0<\/em><\/p><p><strong>2 &#8211; Automatic remediation will get the green light<\/strong><\/p><p>For years, the idea of letting a machine automatically fix a security issue has been considered verboten. But in 2026, can we afford to keep &#8220;automatic&#8221; on the forbidden list? The expanding\u00a0attack surface\u00a0and the velocity of threats are forcing a reevaluation of this well-established no-no.\u00a0<\/p><p>\u201cAutomatic remediation, mobilization, and mitigation are no longer forbidden,\u201d Tenable Chief Security Officer Robert Huber says.\u00a0<\/p><p>Embracing automation not just for detection, but for the actual fixing of problems, represents a major cultural change in cybersecurity, moving trust from human hands to automated systems.<\/p><p>\u201cFor years, teams have been hesitant to automatically remediate, but I believe that to keep pace with the threat and expansion of the attack surface, teams will start to defy that long-held belief that automatic is forbidden,\u201d he adds.<\/p><p><em><strong>Prediction:\u00a0<\/strong>In 2026, teams will rethink the tenet that\u00a0<\/em><em>automatic remediation<\/em><em>\u00a0is too risky to implement, as manual remediation proves unsustainable for most organizations that want to stay ahead of the curve and manage their\u00a0<\/em><em>cyber risk<\/em><em>\u00a0effectively without overwhelming their security pros.<\/em><\/p><p><strong>3 &#8211; Cloud security focus shifts from runtime detection to prevention-first strategies<\/strong><\/p><p>Is the industry finally moving past the idea that runtime detection is a silver bullet? We think so. Heading into 2026, security leaders are increasingly recognizing that many cloud breaches begin well before runtime, and will look to build a resilient defense via a broader, preemptive approach.\u00a0<\/p><p>\u201cThe 2025 hype that runtime detection is the only thing that matters and could replace posture or identity analysis will fade in 2026,\u201d says Liat Hayun, Tenable Senior Vice President of Product Management and Research.<\/p><p>\u201cRuntime-only tools miss most attack paths because identity abuse and misconfigurations occur long before anything reaches runtime. Runtime will remain important, but it won\u2019t replace CNAPP or exposure management \u2013 it\u2019ll be another data source inside a broader prevention-first approach,\u201d she adds.<\/p><p><em><strong>Prediction:\u00a0<\/strong>The narrative that runtime detection can supersede identity and posture analysis will rapidly lose steam in 2026. Instead, runtime tools will function as a complementary data input, reinforcing a security architecture that is anchored on a\u00a0<\/em><em>CNAPP<\/em><em>\u00a0and an\u00a0<\/em><em>exposure management platform<\/em><em>\u00a0and that\u00a0<\/em><em>preemptively identifies and mitigates risks<\/em><em>.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e698934 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"e698934\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c3e192 elementor-widget elementor-widget-heading\" data-id=\"5c3e192\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-246cab3 elementor-widget elementor-widget-text-editor\" data-id=\"246cab3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6><em><strong>By: Juan Perez<\/strong><\/em><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d1135c elementor-widget elementor-widget-text-editor\" data-id=\"9d1135c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>4 &#8211; Acceleration becomes the single biggest threat to your organization<\/strong><\/p><p>Can your security team move faster than a lightning-quick AI-driven attack? In 2026, attack speed will become the greatest challenge for cyber defenders. As attackers leverage automation to compress the attack lifecycle, the window for effective response shrinks.\u00a0<\/p><p>\u201cThe who, what, how, and why of an attack don\u2019t matter because AI-fueled attacks start and end before a ticket is even created,\u201d Doerr says.<br \/>\u00a0<\/p><p>That\u2019s why organizations must make it a priority to quickly set up preemptive security programs. Otherwise, they leave themselves exposed to cyber risks that traditional, reactive methods simply can\u2019t mitigate. \u201cProactive defense makes speed obsolete,\u201d he says.<\/p><p><em><strong>Prediction:<\/strong>\u00a0In 2026, AI-fueled acceleration will become adversaries\u2019 primary weapon, rendering\u00a0<\/em><em>reactive security measures<\/em><em>\u00a0ineffective. In response, cyber teams must shift to\u00a0<\/em><em>proactive cyber prevention<\/em><em>, which eliminates exposures before they can be exploited, neutralizing the speed advantage that AI provides to cyber criminals.<\/em><\/p><p><strong>5 &#8211; CISOs will embrace AI security tools built in-house<\/strong><\/p><p>As we move past the novelty phase of generative AI, 2026 will mark a shift toward the utility of agentic AI, and with it a growing appreciation for custom-made AI security tools tailored for an organization\u2019s specific needs.<\/p><p>Complementing off-the-shelf AI products with tools built in-house will allow for more precise, effective security workflows and processes that can lessen the burden on overworked cyber pros.<\/p><p>\u201cWhen implemented and designed with care, custom-made AI tools will transform security operations and alleviate pain points that lead to burnout,\u201d Huber says.<\/p><p><em><strong>Prediction:\u00a0<\/strong>In 2026, rather than relying solely on commercial AI security tools, CISOs will direct their teams to build their own AI wares tailored to their organization&#8217;s unique challenges. These customized AI tools will, in turn, sharpen their\u00a0<\/em><em>cybersecurity programs<\/em><em>\u00a0and lighten the workload on their staff.<\/em><\/p><p><strong>6 &#8211; Non-human identities will become the top cloud breach vector<\/strong><\/p><p>Machine identities now outnumber human users by many orders of magnitude. This explosion of non-human identities (NHIs) is creating a massive, stealthy attack surface. In 2026, these billions of service accounts, keys, and tokens are set to become the primary vector for cloud breaches.<\/p><p>\u201cThe core problem is no longer misconfigs or missing patches. It\u2019ll be billions of unseen, over-permissioned machine identities that attackers \u2013 or autonomous agentic AI \u2013 will leverage for silent, undetectable lateral movement,\u201d Hayun says.<\/p><p>\u201cCISOs will be forced to pivot massive spending toward permissions governance and large-scale cleanup as machine-identity sprawl has rendered cloud environments truly unmanageable,\u201d she adds.<\/p><p><em><strong>Prediction:\u00a0<\/strong>NHIs will decisively become the number one cloud breach vector in 2026, a trend driven by myriad machine identities with excessive privileges. As a result, CISOs will need to prioritize getting this vast landscape of machine identities under control by strengthening\u00a0<\/em><em>identity and access management<\/em><em>\u00a0(IAM) governance and execution.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f033f89 elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f033f89\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.tenable.com\/blog\/cybersecurity-snapshot-2026-cyber-predictions-ai-security-agentic-ai-custom-ai-tools-automated-remediation-identity-security-cloud-risk-1-2-2026\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-45e53bf e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"45e53bf\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aec1cc6 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"aec1cc6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8df9162 elementor-widget elementor-widget-heading\" data-id=\"8df9162\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get to know the new version of MailStore!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7167b83 elementor-widget elementor-widget-heading\" data-id=\"7167b83\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><p><span style=\"font-size: 1rem\"><b>MailStore V25.2<\/b><\/span><\/p><p>MailStore presents a new version of our email archiving <em>software<\/em>:<\/p><p>Version 25.2 of MailStore Server, MailStore Service Provider Edition (SPE) and MailStore Gateway is now available!<\/p><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df2aaeb elementor-widget elementor-widget-image\" data-id=\"df2aaeb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"457\" height=\"325\" src=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/mailstore-v25.2-e1744713127322.png\" class=\"attachment-large size-large wp-image-7144\" alt=\"\" srcset=\"https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/mailstore-v25.2-e1744713127322.png 457w, https:\/\/dssi.pt\/wp-content\/uploads\/2025\/04\/mailstore-v25.2-e1744713127322-300x213.png 300w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7274d5a elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"7274d5a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.mailstore.com\/en\/blog\/mailstore-v25-2\/?utm_medium=email&#038;_hsenc=p2ANqtz--U0_VYYoMVyH6fkE7C5lE3scPLiViZ0jDd82vJbhFjFbJvJZwZ2kqc8SxQP_qdzH_u03cyiEPi8q2Fcv81xeeMfAX3pg&#038;_hsmi=354734370&#038;utm_content=354734370&#038;utm_source=hs_email&#038;hsCtaTracking=98f0c766-b68e-4a7e-a8b7-bd7b29a268aa%7C5b54ee1e-7ba2-4d45-b377-910e84b1d11d\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">LEARN MORE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23e4690 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"23e4690\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-90805b1 elementor-widget elementor-widget-text-editor\" data-id=\"90805b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Key Features:<\/strong><\/p><p><strong><span style=\"text-decoration: underline;\">MailStore Supports OAuth Authentication for Outlook.com<\/span><\/strong><\/p><p>The MailStore archive profile for Outlook.com, including all email domains, now finally supports OAuth authentication. This makes <em>login<\/em> problems a thing of the past. <\/p><p><strong><span style=\"text-decoration: underline;\">Email Archiving for NoSpamProxy Users<\/span><\/strong><\/p><p>With MailStore version 25.2, NoSpamProxy users can archive e-mails. NoSpamProxy is configured via a connector so that emails are sent to the MailStore Gateway. <\/p><p><span style=\"text-decoration: underline;\"><strong>More improvements<\/strong><\/span><\/p><p>In version 25.2 of MailStore, some third-party components have been updated to increase the security of our <em>software<\/em>. Other minor improvements and <em>bug<\/em> fixes can be found in our <em>changelog<\/em>. <\/p><p><span style=\"text-decoration: underline;\"><strong>Up-to-date certifications<\/strong><\/span><\/p><p>Like other new versions, Version 25.2 is, of course, certified according to IDW PS 880 (DACH region only) and the EU GDPR.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>News Here you&#8217;ll find the latest updates, news and most relevant events on technology! Stay on top of the main events, innovations and trends in the market, as well as updates on projects and initiatives. Follow us so you don&#8217;t miss any news! When most security teams think about insider risk, they immediately picture the malicious actor: the disgruntled employee downloading a customer list before quitting, or the rogue developer leaking source code to a competitor. Those scenarios are real and dangerous, but while malicious insider activity gets the most attention, the greater and more persistent risk comes from well-intentioned employees whose routine actions and blind spots accidentally put sensitive data at risk \u2014 often without anyone realizing it. Insider risk isn\u2019t just about intent. It\u2019s about context, access, and misaligned incentives. And while most organizations think they have \u201cgood policies\u201d in place, the real risk lives in the space between written rules and lived behaviors. That\u2019s where visibility gaps emerge and where insider threats thrive. In this post, we\u2019ll break down the lesser-known, but incredibly common,\u00a0insider risk\u00a0gaps that organizations tend to overlook. If your\u00a0insider risk program\u00a0feels solid on paper, consider this a reality check. What follows isn\u2019t about bad actors or headline-worthy breaches, but the everyday patterns of work that quietly create exposure long before anyone realizes it. Offboarding: The Soft Underbelly of Insider Risk Let\u2019s start with one of the most obvious, but least consistently executed, vulnerabilities:\u00a0employee offboarding. Many companies don\u2019t immediately revoke access when someone leaves. Maybe HR notifies IT a day late. Maybe it\u2019s a slow Friday and the admin queue doesn\u2019t get touched until Monday. Maybe a contractor wraps up a project and their credentials just fall through the cracks. Even a short delay gives an insider the window they need to exfiltrate critical files, scrape email threads, or clone repositories. And in hybrid environments where employees can work from anywhere, it\u2019s not like they need to be in the office to execute their plan. The issue here isn\u2019t just technical, it\u2019s procedural. Offboarding often relies on a chain of handoffs across teams, tools, and systems that aren\u2019t designed to stay perfectly in sync. Without centralized visibility, security teams are left assuming access has been revoked without being able to confirm that it truly has everywhere it matters. Role Creep: When Access Expands but Never Contracts It happens all the time. An employee gets temporary access to a sensitive system or dataset for a project. The project ends. But no one ever removes the access. Multiply that across dozens of projects, hundreds of users, and years of growth, and you end up with\u00a0role creep\u00a0\u2014 users accumulating access they no longer need, often to data that\u2019s far outside their current responsibilities. Over time, this creates a bloated, over-permissioned environment where a single compromised or malicious insider has reached far beyond what their job should allow. The scariest part? Most companies have no easy way to map access patterns against actual job function. It\u2019s not just about who\u00a0can\u00a0access sensitive data. It\u2019s about who\u00a0should. Role creep doesn\u2019t turn employees malicious. It turns ordinary trust into latent risk by quietly handing out more access than anyone intended. Cloud Collaboration Tools: The Unseen Exit Route Not long ago, collaboration was relatively contained. Files lived on shared servers. Documents moved through email. Infrastructure teams had clear control over where data went and how it was shared. Today, that model is gone. Slack, Google Drive, Dropbox, Notion, and GitHub are the lifeblood of modern work, and they\u2019ve fundamentally changed how information moves inside organizations. Not because they\u2019re insecure, but because data now flows freely across tools and users in ways most teams struggle to fully monitor. Security teams often don\u2019t have deep visibility into what users are doing in these tools. Sensitive files can be shared with personal accounts, exposed to public links, or downloaded in bulk \u2014 all without triggering traditional\u00a0DLP\u00a0rules. Chat messages can contain customer data, pricing information, screenshots, credentials, and more. And in many cases, none of it is logged, flagged, or correlated with broader user behavior. Collaboration platforms blur the line between communication and storage. As conversations turn into files, links, and shared artifacts, sensitive data quietly proliferates; copied, cached, and stored across multiple tools long after its original context is gone. Without monitoring these platforms for insider behavior, organizations miss one of the fastest-growing vectors for silent data loss. The Biggest Insider Risk Gaps You Probably Haven\u2019t Thought About By: Code Padula, Sales Engineer Personal Devices and Unmanaged Endpoints Even in companies that issue corporate laptops, employees still use personal phones, tablets, or home machines to check emails, open Slack threads, or view dashboards. And for contractors or freelancers, unmanaged devices are often the default. That creates a serious blind spot. Even if your main endpoint protection solution is doing its job, you can\u2019t enforce policy or capture telemetry on personal or BYOD endpoints. If a user downloads sensitive documents to their home desktop or screenshots internal tools on their iPhone, you won\u2019t know. And once that data leaves your visibility layer, it\u2019s gone. Hybrid work has made this problem worse. Employees are logging in from cafes, co-working spaces, shared home offices, and doing real work on devices you don\u2019t control. Without endpoint visibility, insider risk becomes almost impossible to quantify, let alone contain. Print, Copy, Screenshot: The Analog Loophole Security teams spend millions on digital controls, but forget about the oldest data exfiltration tools in the book:\u00a0printer trays, clipboard copy, and camera rolls. Yes, people still print sensitive documents. Yes, they still take pictures of their screens. And yes, they still copy and paste information from secure systems into personal files, unmanaged notes, or third-party platforms. These are analog behaviors in a digital world and most organizations have no answer for them.\u00a0Traditional DLP\u00a0can\u2019t detect when someone pulls out their phone. It won\u2019t trigger an alert when someone uses the Snipping Tool or grabs content through Command + C. Yet these actions are incredibly common and<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-7248","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/comments?post=7248"}],"version-history":[{"count":9,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7248\/revisions"}],"predecessor-version":[{"id":13320,"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/pages\/7248\/revisions\/13320"}],"wp:attachment":[{"href":"https:\/\/dssi.pt\/en\/wp-json\/wp\/v2\/media?parent=7248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}