• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Wednesday, April 22, 2026
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
Remita Remita Remita
ADVERTISEMENT

Insider cyber security threats now escalating danger for businesses

Technology Times StaffbyTechnology Times Staff
10/01/2015
in News
Reading Time: 3 mins read
1 0
A A
0
gI 81529 Corporate Secrets
ADVERTISEMENT
It was recently confirmed that an insider at Morgan Stanley exposed the account information of hundreds of their most wealthy clients, only to be discovered after posting the information online in an attempt to sell the information.
With the potential devastation and losses these kinds of attacks can have on any business, Joe Caruso, the founder and CEO/CTO of Global Digital Forensics (GDF), a premier national provider of cyber security solutions headquartered in New York City, reviews insider threats and what organizations can do to protect their sensitive and vital digital assets.
Shakespeare may have immortalised the sentiment, but it’s a reality many organizations face every day; being betrayed by one once trusted, is the unkindest cut of all.
Morgan Stanley, a financial services corporation that has been serving companies, governments and investors from around the world since 1935, announced on Monday, January 5th, that it recently got a small taste of that particular pain.
According to a report published by CNN Money on the same day, an insider at Morgan Stanley exposed the personal details of hundreds of its richest wealth management clients, including names and account numbers, by posting them online, which they claim they found and took down on December 27th, before any of the 900 clients suffered any kind of economic loss due to the event.
It could have been much worse though. According to the report, logs indicated the insider had accessed records on 350,000 clients, a portfolio that last year made up assets worth more than a whopping $2 trillion. Had the perpetrator been more successful, the full magnitude of the cut would certainly have been agonizing, if not fatal.
Joe Caruso, the founder and CEO/CTO of Global Digital Forensics (GDF), a premier national provider of cyber security solutions headquartered in New York City, says, “If they have totally contained the problem and got everything pulled down before any damage was caused, they really dodged a bullet. They can be very thankful they have the resources and personnel to be able to relentlessly scour the dark corners of the Web to uncover sensitive data that got carried out of the castle by one of their own. The vast majority of businesses don’t have that luxury, but every one of them is facing the possibility of an insider going rogue every single day.”
Assessing the threats from within
“The first step to controlling the insider threat problem is knowing what you’re up against,” says Caruso. “Our cyber vulnerability assessments take into account who has access to what kinds of data internally for just that reason. Just because someone is hired by a company, doesn’t mean they should have carte blanche to everything. Access should always be restricted to only those with a direct need to access certain kinds of data. By working closely with the organization’s IT staff to get a better understanding of the data flow, how it’s used and who has and/or needs access, we can help identify trouble spots and offer ways to help solve them. We also offer electronic exit interviews which can help reveal what an employee on their way out may have accessed, downloaded or copied before leaving the company, helping to ensure that important data stays in-house instead of finding its way into the hands of a competitor or is used to cause trouble by a disgruntled ex-employee.”
The malicious insider – Scene 1
“From the ever present eye-in-the-sky in Vegas casinos, to the counter at a 7-Eleven, video surveillance has become a front line tool for not only protecting organizations from outsiders doing bad things, but also serving as a formidable deterrent against insiders behaving badly as well. So why not put that double edged sword to work protecting your network as well?” says Caruso.
“To that end, we’ve developed the C-All User Activity Monitor/Recorder, which records screen captures and keystrokes from any and all systems with the C-All client installed. C-All makes it easy to spot, understand and be able to prove exactly what kind of insider abuse or misuse may be occurring now, or has in the past. It also captures remote desktop sessions in full video and allows the playback of the sessions by user, or by session. Once installed, C-All begins capturing activity and archiving it on a secure server on the network with a compression scheme that doesn’t hog precious drive space and resources at all, capturing all sessions and storing them for easy playback. C-All also allows for real-time monitoring. From deciphering inexplicable declines in productivity, to arming legal staff or other company personnel with concrete, indisputable evidence of any illicit or destructive activity, our C-All User Activity Monitor/Recorder is the tool that shifts the balance of power back where it belongs, in the hands of trusted IT security staff, administrators, executives and business owners. So no more mysteries that can’t be solved or proven, and no more feeling out of control. C-All is easy to use and very customizable, so you can set triggers to alert IT security when certain files are being accessed, when certain sites are visited, or even when certain keywords are typed in, and those alerts can even be sent via email to get the right people on the problem right away. Yes, insider threats can be devastating, but there are certainly things that can be done to drastically reduce the chances of becoming the next headline-making victim of a rogue insider.”

Related Articles

Sokoto State unveils ICT expansion plan for rural children 

Skype group video call comes to Windows 10 mobile

Malware: What it is and why should you care

Instagram to allow accounts switching on iOS, Android apps

Opera Max out for Netflix viewers across Africa

Video: Inside Ikeja Computer Village

Video: IXP Nigeria on the road ahead for Internet

YouTube: Google wants to make video content ‘affordable’

UNICEF offers tips to keep your child safe online

OnePlus smartphone unveiled with fast-charge technology

Stay ahead with real-time reports, breaking news, and exclusive insights delivered directly to your phone. Don't settle for outdated information. Join TECHNOLOGYTIMES NEWS on WhatsApp for 24/7 updates.

Join Our Whatsapp Channel
Tags: Cyber securityvideo
Share21Tweet13Share4SendShare
Previous Post

How to ‘secure your phone line’ with MTN Security Number

Next Post

Omobola Johnson at TEDx: KPIs are not enough

Technology Times Staff

Technology Times Staff

News and Reports from Technology Times Newsroom. Call/SMS/WhatsApp: +234 815 7000 100

Related Posts

Consumer Technology

Video: How to use Microsoft Lumia 535 smartphone

byTechnology Times Staff
16/12/2014
Skype Introduces Skype TX 4 for Live Broadcasting.
Market Updates

Skype now lets users interact with favourite Liverpool FC players

byElizabeth Edozie
26/04/2016
Reviewed: Top selling phones in Nigeria
Consumer Technology

#TecnoCamContest pushes Phantom Z in Nigeria

byKolade Akinola
01/12/2014
Mr Shina Badaru, Founder of Technology Times
News

Video: Technology Times Founder: Telecoms has become huge driver of growth for Nigerian economy

byTechnology Times Staff
30/09/2014
Catch Wiko Fever Special Edition smartphone
Consumer Technology

Catch Wiko Fever Special Edition smartphone

byDonatus Anichukwueze
29/02/2016
Satellites transmitting digital TV signals
News

Minister: BBC, CNN eye Nigeria’s Digital TV stakes

byDonatus Anichukwueze
14/03/2016
A mobile user using Facebook App
Consumer Technology

Alert: Scammers now lure Facebook users to download malware

bySuccess Kafoi
21/04/2016
Market Updates

Facebook introduces FbStart to drive startups’ growth

byKayode Oladeinde
06/05/2014
IBM, SAP to accelerate digital economy
Market Updates

Nokia’s new Passive Optical LAN to ease networking

bySuccess Kafoi
08/04/2016
Market Updates

Hughes closes deal to expand Managed Network services for African Development Bank

byTechnology Times Staff
08/04/2013
Next Post
right-of-way-ekiti-state-nigeria

Omobola Johnson at TEDx: KPIs are not enough

Busted! EFCC foils plan to sell Australian real estate online

Busted! EFCC foils plan to sell Australian real estate online

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

4 × 4 =

Latest Articles

globacom-pushes-back-telecoms-growth-narrative

Globacom pushes back on subscriber-led narrative, reframes telecoms competition around ‘depth, not speed’

22/04/2026
nitda-nnpc-drive-local-technology-oil-and-gas

NITDA, NNPC to drive local technology in oil and gas industry

22/04/2026
cbn-raises-urgent-alarm-over-phishing-scams

CBN raises urgent alarm over phishing scams targeting Nigerians

22/04/2026
fg-eyes-technology-partnership-with-sinoma

FG eyes technology partnership with Sinoma to accelerate affordable housing

22/04/2026
adamawa-moves-to-digitise-land-administration

Adamawa moves to digitise land administration

22/04/2026
ADVERTISEMENT
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT

Most Read

  • cac-probes-cybersecurity-breach-on-registry

    CAC probes cybersecurity breach on Nigeria’s corporate registry platform

    75 shares
    Share 30 Tweet 19
  • Sun sets on manual planning permit processing in Lagos State

    69 shares
    Share 28 Tweet 17
  • NDPC probes cybersecurity breach of Nigeria’s corporate database at CAC

    68 shares
    Share 27 Tweet 17
  • Globacom pushes back on subscriber-led narrative, reframes telecoms competition around ‘depth, not speed’

    67 shares
    Share 27 Tweet 17
  • ‘CNII framework faces test’ as fibre damage incidents rise in Nigeria

    66 shares
    Share 26 Tweet 17
  • NDPC: Nigeria faces Data Protection Officers’ shortfall amid 500,000 compliance

    77 shares
    Share 31 Tweet 19
  • SEC: e-Dividend portal upgrade tackles unclaimed dividends

    290 shares
    Share 116 Tweet 73
  • NCC–CBN pact positions TIRMS as Nigeria’s frontline defence against SIM-enabled financial fraud

    62 shares
    Share 25 Tweet 16
  • NIPOST inks landmark Zonos deal to ease Nigerian exports to U.S. market

    619 shares
    Share 248 Tweet 155
  • IHS Nigeria backs Ilorin hub to expand Nigeria’s tech ecosystem

    58 shares
    Share 23 Tweet 15
eGovernance Nigeria Magazine eGovernance Nigeria Magazine eGovernance Nigeria Magazine
ADVERTISEMENT

Latest Videos

  • TT TV
data-privacy-and-nigerias-online-consumers

Data privacy and Nigeria’s online consumers | Technology Times Live TV

11/08/2025
9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

08/08/2025
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
Load More
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

WhatsApp: +234 201 454 1818
WhatsApp: +234 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

  • credicorp-portal-for-nigeria-consumer-credit

    CREDICORP: FG opens portal on www.credicorp.ng for Nigerians to access consumer credit

    15746 shares
    Share 6298 Tweet 3937
  • CUG: NCC caps call rate at ₦50, bans data bundling

    5061 shares
    Share 2024 Tweet 1265
  • 9mobile rebrands today, targets multibillion-naira comeback in mobile market

    4420 shares
    Share 1768 Tweet 1105
  • Exclusive: Boardroom battle erupts at 9mobile, threatens spectrum trade deal with MTN

    3893 shares
    Share 1557 Tweet 973

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.