Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/12/2019
10:30 AM
Ilan Paretsky
Ilan Paretsky
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Identifying, Understanding & Combating Insider Threats

Your organization is almost certainly on the lookout for threats from outside the company. But are you ready to address threats from within?

Most, if not all, organizations are vigilant about safeguarding against threats that can penetrate endpoint systems via email, websites, and other known and unknown pathways. But what about threats that come from within your organization? Even worse, from those who you assume can be trusted?

What Are Insider Threats?
"Insider threats" are far from monolithic. Although we tend to think of vengeful former employees or contractors on the lookout for ill-gotten gains, the truth is that many insider breaches are wholly unintentional. CA's Insider Threat 2018 Report states that companies should be at least as worried about the 51% of data breaches that are accidental or unintentional —  caused by user carelessness, negligence, or compromised credentials — as they are about the slightly smaller percentage caused by deliberate malicious insider activity (47%).

This year, 90% of organizations are estimated to be vulnerable to insider threats, and over 50% have experienced an insider attack in the past year.

When it comes to preventing mishaps that lead to unintentional breaches of organizational systems, user education is a top priority. Make security training an essential part of the onboarding process. When systems are updated, or new processes or procedures put in place, education and training sessions will lessen the likelihood of attacks from within due to errors or negligence.

But how can you anticipate malicious attacks from within and prevent them and the damage they cause before it's too late? 

Identify the Early Warning Signs
Business owners, IT staff, and cybersecurity professionals must always be alert to the possibility of insider threats because keeping data safe from those who have permission to access it depends on rapid identification of and response to breaches. Malicious insiders have the upper hand; they're already past your defenses. With authorized system access, they have sensitive data at their fingertips, know the organization's weaknesses, and can easily acquire valuable assets. The Insider Threat 2018 Report indicated that both regular employees (56%) and privileged IT users (55%) pose the greatest insider security risk to organizations, followed by contractors (42%).

Attend to Unhappy Employees
Are employees dissatisfied? Remember that unhappy employees might be easily tempted. Keeping an eye on employees and considering their state of mind is more than just good HR practice — it is a good cybersecurity policy as well.

So, reach out to your employees. Meet with them, speak with them. Try to understand how they feel about the state of your organization. Fixing issues before they boil over into malicious cyberactivity can save the company from the trouble that would result from an insider breach.

Revoke Access Immediately upon Termination
Former employees who still have access to company networks and data pose a significant security threat — those who were let go from their positions pose particular risks. For example, in 2014, when Sony Pictures was hacked, researchers from Norse Corporation found that a group of six people, including one ex-employee, were directly involved. The individual who had a previous relationship with Sony was laid off just a few months prior to the attack. Coincidence? More like revenge.

Institute IT procedures for employee termination and adhere to them thoroughly and promptly. Notify IT immediately when a user's employment has ended and ensure that all access privileges to networks, data, and computer equipment are quickly revoked.

Keep an Eye Out for Financial Distress
Insider breaches have been known to be motivated by financial need — and greed. Whether an employee is experiencing a credit squeeze, didn't receive an anticipated promotion or raise, or is facing unexpected pressures from a health crisis or other cause, outside pressures may lead an individual to generate much-needed cash however he or she can.

In addition to posing a cybersecurity threat, financial stress affects employee productivity and health. HR professionals should ensure that managers are aware of the signs of financial stress and alert them to worrisome employee behaviors that may result.

Watch for Sudden, Unexplained Changes in Interests or Behaviors
Is an individual suddenly working late or odd hours? Be aware of out-of-the-ordinary, unexplained behaviors. Employees who have a sudden interest in accessing classified material or information outside of their current assignments should obviously raise a red flag. Investigate why they might be interested. Don't assume you can trust them, no matter what their role in the company might be.

Consider Edward Snowden. The former CIA agent and US government contractor publicly released records on government surveillance before fleeing the country and to this day says he has no regrets.

Fighting Back with Least-Privilege Access
Best practices for preventing insider threats start with standard practices for overall employee risks: Be aware of suspicious or erratic behavior. Follow termination procedures to the letter. Notice dissatisfaction and try to address it.

Today, to reduce the attack surface for insider threats, organizations are increasingly limiting employee permissions based on the principle of least-privilege access. Each user has access privileges only for the systems and data needed for the job. Likewise, each system has the least authority necessary to perform its assigned duties.

The zero-trust concept takes the least-privileges approach to combatting insider threats still further, based on the principle that no person or device should be trusted, whether it is within or outside of the network perimeter. It requires every person and/or device to be validated and authenticated to access each resource. Microsegmentation stops the spread of malicious agents, should they get in. 

As a result, fewer employees can take malicious actions, fewer accounts can be hacked, and fewer people can make errors that result in breaches.

Related Content:

 

 

Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

Ilan Paretsky leads the global marketing activities of Ericom. He is responsible for positioning, demand generation, go-to market planning, strategic market direction research, online and offline marketing planning, and execution for Ericom's broad portfolio of security, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Lessons from the NSA: Know Your Assets
Robert Lemos, Contributing Writer,  12/12/2019
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...