sb-nz logo
Story image

When innocent mistakes turn into costly problems

01 May 2017

According to Forrester Consulting research, security and risk (S&R) decision-makers face threats from three groups of insiders—compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems) and malicious insiders (insiders who purposefully take or misuse data or exploit systems).

While S&R professionals often think “outside-in” first when assessing threats to their organisations, awareness of internal threats can also be a key requirement for securing key systems. 

Nearly two-thirds of the firms in the study had experienced a security incident involving a compromised account in the past two years, while 57% had an incident stemming from careless misuse and 41% from a malicious insider in that same period. Tellingly, only 1% said they had no incidents involving insiders.

Beyond how frequently they happen, insider threats also result in significant financial and productivity losses for a majority of firms that experience them.

  • Compromised accounts: Three quarters of respondents said compromised accounts had a significant or moderate financial impact, and 68% said they had a significant or moderate productivity impact.
  • Malicious insiders: Sixty-four percent said malicious insiders caused a significant or moderate financial impact, and 57% said it had a significant or moderate productivity impact.
  • Careless misuse: Sixty-one percent said that careless misuse incidents had a significant or moderate financial impact, while 56% said they had a significant or moderate productivity impact on their companies.

When most people hear about an “insider threat,” they often assume it’s a malicious employee who is either out to prove a point or trying to selfishly make a buck. Yet, as one startup learned last week, the real “insider threat” is often a well-intentioned person who, in the course of simply trying to do his or her job, accidentally causes something to go wrong.

Most employees are not out to steal sensitive information; they’re simply trying to do their jobs. For some, this means storing files in Dropbox or sending information via personal email—actions that may seem harmless, but can unintentionally put data and systems at risk. The Unintentional Insider In a recent survey from PwC, 50% of organisations reported that their single worst breach during the previous year was attributed to inadvertent human error.10

Human error is a prevalent cause of accidents, which means IT and security teams should prepare accordingly to limit the resulting damage.  Here are a few steps organisations can take to limit the impact of accidental insider damage:

  • Reduce the attack surface to limit insider threat exposure: Restrict standard user privileges based on role to limit intentional or accidental damage. Control applications to reduce the risk of users becoming exploited. 
  • Don’t leave credentials lying around: Store privileged credentials in a secure, central repository that supports strong access controls, multi-factor authentication, and full auditability. Change these credentials on a regular basis.
  • Limit the power of any one account: Segregate administrative duties based on privileged users’ specific roles. Only allow full admin or root access when necessary.
  • Do what you can to deter bad behaviour: Track the individual use of privileged and shared accounts, and record activity to tie a specific “who” to each action taken. Tell users they are being monitored, and consistently watch for changes in employee behaviour. By recording all activity as users access sensitive IT systems, you can encourage your most privileged users to double check their work and discourage any foul play. This means fewer mistakes, fewer malicious actions and less damage to clean up.
  • Look for attackers disguised as authorised insiders: Attackers operating with privileged accounts will look like authorised insiders, but their behaviour will likely be different. Monitor and analyse privileged user and account behaviour to learn what’s normal to more easily identify anomalies that may indicate in-process attacks.
  • Backup. Then backup some more. If IT teams learned one thing in 2016 (or “The Year of Ransomware” if you read the news), it’s that backing up sensitive data is an imperative. Whether an IT admin accidentally deletes an entire database or a cybercrime ring takes your servers hostage, backups are extremely handy. Just ask any of the companies who learned this lesson the hard way.

Article by Jeffrey Kok, Director of Pre-Sales, Asia Pacific and Japan, CyberArk.

Story image
Netlinkz revenue surges 846% as secure enterprise cloud technology gains traction
Executive chairman James Tsiolis believes this growth is the start of something much bigger.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Link image
Cloud infrastructure sprawl a major issue for digital business
MoneySupermarket Group shares how performance monitoring helped him reduce cloud costs by 50%, among other business benefits.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Link image
When it comes to data, resilience is king
Data is the most important asset for a business. But if it's not stored securely, or if it's not instantly available, its value can plummet. Learn more here.More