Most employees are not out to steal sensitive information; they’re simply trying to do their jobs. But what if someone slips up and does something stupid?
According to Forrester Consulting research, security and risk (S&R) decision-makers face threats from three groups of insiders:
- Compromised accounts (internal accounts that have been compromised by external attacks),
- Careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and
- Malicious insiders (insiders who purposefully take or misuse data or exploit systems).
While S&R professionals often think “outside-in” first when assessing threats to their organisations, awareness of internal threats can also be a key requirement for securing key systems.
Nearly two-thirds of the firms in the study had experienced a security incident involving a compromised account in the past two years, while 57 per cent had an incident stemming from careless misuse and 41 per cent from a malicious insider in that same period. Tellingly, only 1 per cent said they had no incidents involving insiders.
Security threats from different sources
Beyond how frequently they happen, insider threats also result in significant financial and productivity losses for a majority of firms that experience them:
- Compromised accounts: Three quarters of respondents said compromised accounts had a significant or moderate financial impact, and 68 per cent said they had a significant or moderate productivity impact.
- Malicious insiders: Sixty-four percent said malicious insiders caused a significant or moderate financial impact, and 57 per cent said it had a significant or moderate productivity impact.
- Careless misuse: Sixty-one percent said that careless misuse incidents had a significant or moderate financial impact, while 56 per cent said they had a significant or moderate productivity impact on their companies.
When most people hear about an “insider threat,” they often assume it’s a malicious employee who is either out to prove a point or trying to selfishly make a buck. Yet, as one startup learned recently, the real “insider threat” is often a well-intentioned person who, in the course of simply trying to do his or her job, accidentally causes something to go wrong.
Most employees are not out to steal sensitive information; they’re simply trying to do their jobs. For some, this means storing files in Dropbox or sending information via personal email—actions that may seem harmless, but can unintentionally put data and systems at risk. The Unintentional Insider In a recent survey from PwC, half of organizations reported that their single worst breach during the previous year was attributed to inadvertent human error.
What you can do to limit the impact of accidental damage
Human error is a prevalent cause of accidents, which means IT and security teams should prepare accordingly to limit the resulting damage. Here are a few steps organizations can take to limit the impact of accidental insider damage:
Reduce the attack surface to limit insider threat exposure: Restrict standard user privileges based on role to limit intentional or accidental damage. Control applications to reduce the risk of users becoming exploited.
Don’t leave credentials lying around: Store privileged credentials in a secure, central repository that supports strong access controls, multi-factor authentication, and full auditability. Change these credentials on a regular basis.
Limit the power of any one account: Segregate administrative duties based on privileged users’ specific roles. Only allow full admin or root access when necessary.
Do what you can to deter bad behaviour: Track the individual use of privileged and shared accounts, and record activity to tie a specific “who” to each action taken. Tell users they are being monitored, and consistently watch for changes in employee behaviour. By recording all activity as users access sensitive IT systems, you can encourage your most privileged users to double check their work and discourage any foul play. This means fewer mistakes, fewer malicious actions and less damage to clean up.
Look for attackers disguised as authorized insiders: Attackers operating with privileged accounts will look like authorized insiders, but their behaviour will likely be different. Monitor and analyse privileged user and account behaviour to learn what’s normal to more easily identify anomalies that may indicate in-process attacks.
Backup. Then backup some more: If IT teams learned one thing in 2016 (or “The Year of Ransomware” if you read the news), it’s that backing up sensitive data is an imperative. Whether an IT admin accidentally deletes an entire database or a cybercrime ring takes your servers hostage, backups are extremely handy. Just ask any of the companies who learned this lesson the hard way.
Want to be part of the ecosystem?
Register for your Echelon Asia Summit access pass now! Enjoy +10% off Echelon Asia Summit Startup, Investor and Corporate passes just for being our favourite e27 reader.
The views expressed here are of the author’s, and e27 may not necessarily subscribe to them. e27 invites members from Asia’s tech industry and startup community to share their honest opinions and expert knowledge with our readers. If you are interested in sharing your point of view, submit your post here.
Featured Image Copyright: bloomua / 123RF Stock Photo
The post When innocent mistakes turn into costly problems, you need to act to reduce the damage appeared first on e27.