insider threats

How to solve the problem of insider threats to enterprise cybersecurity? Ronald Sens, EMEA Director, A10 Networks, comments…

How to solve the problem of insider threats to enterprise cybersecurity? Ronald Sens, EMEA Director, A10 Networks, comments… There are many threats to enterprise cybersecurity with most coming from external threat actors. One of the most overlooked threats that companies are not safe from is insider threats. Security professionals are constantly being warned about insider threats and in A10 Networks AIR report earlier this year almost half (48 percent) of IT leaders say they agree or strongly agree that their employees do not care about its security practices. With companies aware of the issue, what are enterprises doing to fight back against these threats and why is it such a major concern? How big is the problem of insider threats? The simple answer is very big. Generally cyber threats present a big issue to many companies, but many can be dealt with by using the appropriate solutions and having trained employees. To tackle insider threats, managers and IT leaders need to take an entirely different approach which can vary depending on the business environment. All insider threats can often be classified into two distinct groups: the malicious, criminal employee and the unknowing, ignorant, employee. Both of these groups have to be approached with in different ways, whilst identifying which employee falls into which group is not simple. Employers have to figure out what motive its staff has to be acting in a malicious way, whilst identifying them from the clumsy employees. It’s a sabotage The motive behind an employee looking to sabotage a business could be inspired from many sources like holding a grudge over a bad personal assessment, peer or management conflicts, differing ideological views or pressure from an outside force. Identifying a motive can be difficult but, favourably, desire alone will not give such employees a chance to act. There needs to be an opportunity as well and this is where those in charge can work to prevent sabotage. Many opportunities can be reached simply by that employee having increased or existing access to delicate points of information and so it is important that managers ensure that all of their employees only have access to the minimum required for their role. Then there are more sinister attempts at disrupting businesses like social engineering tactics – setting up the right scenario for this malicious employee to get access through someone else’s computer/network. Additional actions that security professionals should take notice of are the unusual behaviors of some employees, such as arriving early or leaving after everyone else, recent changes in access, frequency of downloads or failed login request from a use system. Anyone of these could be a sign of an ulterior motive and are good places to start when trying to identify malicious employees in the business. Behaviour is the key and it is important to determine the behaviour patterns of individuals, whether it be done with technology, physical apparatus or digital monitoring tools. Did I do that? With the next group – the unknowing, ignorant, employee – a different approach is needed. The cyber threat from this group can come from many places but it all stems from one issue: they do not realise they are a risk. So, the simple solution to solving this problem is to properly educate staff, and not just the IT department but the entire business, as these risks can come from any department. 88 percent of IT heads say that employees need better education on the best security practices and while many companies do inform their staff of these practices, 29 percent of IT professionals noted a lack of corporate commitment to policies and enforcement. So, while enterprises know the best practices to stop insider cyber threats most of the employees don’t care, so perhaps the area that needs fixing is the method in which enterprises explaiEn these practices? According to the AIR report, password policies are communicated to employees through email reminders (66 percent) followed by employee orientation (50 percent), internal meetings (48 percent), and communication from a manager (44 percent). E-mail reminders are highlighted here as the main way of communication and this should not be the case. In today’s busy work environment employees are receiving e-mails non-stop and, by distributing such vital security information to an already crowded information network, are bound to skip over it. Potentially, they have more pressing work to deal with and so the internal security information is not the priority. Eventually it will be forgotten. The solution is simple. More direct communication with staff and more workshops around cybersecurity could bring these issues to the forefront of employees and make them more aware. Then, regarding passwords, it could be made mandatory to have them changed on a regular basis, with two-step authentication for extra protection. If password change isn’t enforced, then employees are most likely going to be too busy to change them. Passwords not being updated isn’t the most pressing issue regarding insider threats. Every employee can bring with them a vulnerability to the mainframe. The most common threat an unknowing employee can bring with them is opening an entryway with unverified or unsecure apps, both on computers and on phones. Every employee has a mobile phone and most likely a smartphone with multiple apps that they may use throughout the day. Apps that require online connections may end up being connected to the office mainframe and allow a gateway for hackers. Then on computers some apps like Photoshop and Skype are common practice but there are other, less secure, apps that could bring malware with their installation. To tackle this issue, a regulation should be placed on what can and cannot be used in the office, at least on laptops and PC. If an employee wants to install new software, they should need to be granted permission from an admin who can verify that the app is secure. For mobile apps this is harder to control as they aren’t strictly for work but if employees are properly taught about these

How to solve the problem of insider threats to enterprise cybersecurity? Ronald Sens, EMEA Director, A10 Networks, comments… Read More »

Clearswift shows the majority of security incidents are not caused by hackers

Clearswift shows the majority of security incidents are not caused by hackers Clearswift has revealed that extended enterprise is largely responsible for data insecurity – not hackers. Year-on-year the research shows that cyber security incidents – including insider threats – continues to rise, but that companies are able to spot suspicious activity significantly quicker than two years previous. The research also showed that threats from an employee – inadvertent or malicious – make up 42% of incidents, a number that has increased from 2015 when 39% of incidents originated from inside an organisation’s network. When looking at the extended enterprise – employees, customers, suppliers, and ex-employees – this number reaches 74%, compared to 26% of attacks from parties unknown to the organisation. In 2015, 33% of attacks were carried out by unknown parties, so this proportion is falling, which may seem surprising given the recent swathe of high profile attacks, such as WannaCry, which affected over 230,000 computers. The research shows that while it is likely that an incident will occur internally, large external threats are also likely to encourage companies to add cyber security to their agenda. Dr Guy Bunker, SVP Products at Clearswift, said: “As GDPR approaches, every department in a business will need to recognise the potential security dangers associated with the data they use. Businesses may fall victim to the frenzy around high profile attacks and organisations may be quick to look at threats outside the business but, in reality, the danger exists closer to home. The blurring lines between personal and work-based technologies has led to an unabated rise in the insider threat. “A reactive policy of blocking technologies may prove futile as users will inevitably find a work-around. Educating employees about how to safeguard critical information, motivating employees to care more about the ramifications of a breach, and increasing investment in Data Loss Prevention (DLP) tools are the biggest priorities needed to minimise the risk of internal security breaches. “Being a responsible data citizen will also require organisations to look at the way in which partners or suppliers hold and share information, as breaches within the extended enterprise could also lead to heavy fines for the originating business.” Although internal threats pose the biggest threat to most organisations, employers believe that the majority (65%) of incidents are accidental or inadvertent rather than deliberate in intent; this remains unchanged over the past three years and highlights a critical need for better security education within most organisations. This is particularly relevant, as most businesses believe their critical data predominantly lies in non-technical departments, such as finance (55%), HR (45%) and legal or compliance (43%). 600 senior business decision makers and 1,200 employees across the UK, US, Germany and Australia were surveyed for the study.      

Clearswift shows the majority of security incidents are not caused by hackers Read More »

Scroll to Top