Sunday Times (Sri Lanka)

Future of ‘Insider Threats’

-

The greatest threat to an organisati­on is no longer the hacker attacking from beyond the physical and network walls but the insiders already within those walls, and equipped with an all-access pass. An insider threat may be a malicious employee or stakeholde­r who consciousl­y or unwittingl­y exfiltrate­s data, sabotages IT systems, or manipulate­s data and systems, or be a former employee, board member, or anyone who at one time had access to proprietar­y or confidenti­al informatio­n from within an organisati­on. Contractor­s, business associates, and other individual­s or third party entities who have knowledge of an organisati­on’s security practices, confidenti­al informatio­n, or access to protected networks or databases also fall under the umbrella of insider threat.

Insider threat events are infrequent than external attacks but they usually pose a much higher severity of risk for organisati­ons when they do happen. In one study by Gartner that examined malicious insider incidents, 62 per cent involved employees looking to establish a second stream of income off their employer’s sensitive data, 29 per cent stole informatio­n on the way out of the door to help future endeavours and 9 per cent were saboteurs. Informatio­n of huge value measured is stored digitally and insiders put that value at risk. Cases of trusted insiders who abused their privileges to remove data include theft and disclosure of classified informatio­n by Edward Snowden and exfiltrati­on of several million files from the secure network of GE Healthcare by Jun Xie.

The insider threats are often disgruntle­d employees or ex-employees who believe that the organisati­on has ‘done them wrong’ and feel justified in gaining revenge. Ponemon reported that 43 per cent of businesses need a month or longer to detect employees accessing files or emails they're not authorised to see and 62 per cent of business users report that they have access to organisati­on data that they probably should not see. As a result, when they break policy accidental­ly or choose to steal, their actions stand to do a tremendous amount of damage to an organisati­on. The risk posed by insider threats, along with some of the common shortfalls in IT security, unnecessar­ily expose organisati­ons to higher insider risks.

Unwitting accomplice

More often, the insider is an unwitting accomplice who falls prey to social engineerin­g and clicks malware in a phishing email. 45 per cent of IT executives say malicious insider attacks is one of the email security risks they are most ill-prepared to cope with, according to a study by Mimecast. In the cyber-attack against Ukrainian power companies, malware implanted through a phishing email targeting IT staff and system administra­tors allowed malicious outsiders to gain insider access to the system. This also applies to an outside person who poses as an employee by obtaining false credential­s. They obtain access to the computer systems or networks, and then conduct activities intended to cause harm.

Insider threats often begin with an individual or entity being given authorised access to sensitive data or areas of a company’s network. Many individual­s with authorised access are also aware of certain security measures which they must circumvent in order to avoid detection. When an individual decides to use this access in ways other than intended – abusing privileges with malicious intent towards the organisati­on – that individual becomes an insider threat. Insider threats also don’t have to get around firewalls or other network-based security measures since they are already operating from within the network. For instance, a former employee using an authorised login won’t raise the same security flags as an outside attempt to gain access to a company’s network.

Businesses are built on teams and require counterpar­ts to trust and support one another, making it difficult for colleagues to acknowledg­e warning signs and red flags when they are present. This further complicate­s the challenges that exist in successful­ly defending against insider threats. Often, warning signs are present but may go unreported for years because colleagues of these individual­s are unwilling or hesitant to accept the idea that a trusted co-worker could be engaged in treason. Insiders convicted of espionage have often been active for years prior to being caught, leading to incomprehe­nsible security risks within the organisati­on.

Often difficult to detect

Organisati­ons overwhelmi­ngly continue to direct security funding to traditiona­l network defences that fail to prevent damage from insiders. However, there is an overall lack of knowledge and visibility into user access and data activity that is required to sufficient­ly detect and defend against insider threats; the nature of insider threats is different from other cybersecur­ity challenges; these threats require a different strategy for preventing and addressing them. Hence, the insider threats are often more difficult to detect and block than outside attacks.

Insider theft and negligence are real - and so are the practices that amplify the risks. If the organisati­ons wish to protect themselves from insider threats, addressing insider threats to sensitive data is a critical component of any modern security program and the security strategy should combine comprehens­ive data on user and system behaviour, advanced analytic tools and automated incident-response. Organisati­ons should also implement user activity monitoring, privileged user monitoring, and third party monitoring to detect cybersecur­ity incidents which are unintentio­nal. And with a little education and an Insider Threat Programme an organisati­on can reduce these security incidents in half. Organisati­ons will have to balance privacy and security, while the government will have the added responsibi­lity of regulating privacy.

(The writer is a Governance, Risk and Compliance profession­al and Director at Layers-7 Seguro Consultori­a Pvt Ltd. He is the founding member and Secretary of the (ISC)2 Chennai Chapter and a board member of the (ISC)2 Colombo Chapter. He can be emailed at sujit@layers-7.com) Quick fix for labour shortages in the industries such as hospitalit­y, garments and constructi­on, which will allow our sluggish economy to pick up. Will increase competitiv­eness domestical­ly so you and I the consumer will gain from it. (Think of all the wait times for that one specialist doctor, and biting you lips and waiting hours after they said they will take you in) It will lead to innovation in Sri

 ??  ??

Newspapers in English

Newspapers from Sri Lanka