iTWire TV 160x1200notfunny

iTWire TV 160x1200notfunny

iTWire TV 705x108notfunny

Tuesday, 10 September 2024 14:30

Why Insider Threats Are A Growing Challenge For Organisations

By Gareth Cox, Vice President Sales Asia Pacific and Japan at Exabeam
Gareth Cox, Vice President Sales Asia Pacific and Japan at Exabeam Gareth Cox, Vice President Sales Asia Pacific and Japan at Exabeam

Insider threats, malicious activities perpetrated by individuals with legitimate access to an organisation's systems, pose a significant risk to information security.

These threats can come from current and former employees, contractors, or third-party partners, and can be motivated by financial gain, retaliation, negligence, or compromised accounts.

Understanding insider threats

Insider threats can be categorised into three main types:

• Malicious insiders: These are individuals who knowingly seek to steal information or disrupt operations. This may be driven by financial motives, retaliation, or a desire to harm the organisation.

• Negligent insiders: These are employees who unintentionally cause harm due to carelessness or failure to follow proper procedures. This can include actions like leaving computers unlocked or failing to apply security patches.

• Compromised insiders: This group of employees are those whose accounts have been compromised by malware or other malicious attacks. These compromised accounts can be used as a foothold for further attacks.

Becoming compromised

Interestingly, there are a number of ways an organisation’s employees can become compromised insiders.

One of the most common is via a phishing attack in which a targeted individual is contacted via email or text message by someone posing as a legitimate party in order to lure the individual into providing sensitive data. Some phishing schemes may also try to entice an employee to click on a link that triggers a malware download.

Another method is via malware infection where a machine is infected with malicious software. The goal of the malware in the case of a compromised insider is to steal sensitive information or user credentials. An infection can be initiated by clicking on a link, downloading a file, or plugging in an infected USB key.

Yet another method is credential theft which involves the capture of a username and password of a targeted individual. This can be achieved through phishing and malware infection as well as social engineering techniques.

Finally, there is what’s known as ‘pass-the-hash’ attacks in which encrypted or digested authentication credentials are intercepted from one computer and used to gain access to other computers on the network. A pass-the-hash attack is very similar in concept to a password theft attack, but it relies on stealing and reusing password hash values rather than the actual plain text password.

A growing threat

Overall, insider threats are a growing problem, as evidenced by data in a recent Ponemon study. It found that 60% of organisations experienced more than 30 insider-related incidents per year. Of those reported, 62% were attributed to negligence while 23% of incidents were attributed to criminal insiders. The report also found that 14% of insider-related incidents were attributed to user credential theft.

Insider threats are particularly challenging to detect because the threat actor has legitimate access to the organisation's systems and data. This makes it difficult to distinguish between normal and malicious behaviour.

Mitigation strategies

Thankfully, there is a wide range of proactive steps that organisations can take to mitigate the risk of insider threats. These steps include:

• Employee training: Conduct regular security awareness training to educate employees about the risks of insider threats and best practices for protecting sensitive information. Focus on topics such as phishing prevention, password security, and recognising suspicious activity.

• Co-ordination between IT security and HR: Establish strong communication and collaboration between IT security and HR departments to identify potential risks and address employee concerns proactively.

• Employ user behavioural analytics (UBA): Use UBA tools to monitor user behaviour and identify anomalies that may indicate insider threats.

• Implement access controls and review privileges: Restrict access to sensitive information and systems based on job roles and responsibilities. Also, ensure that employees have only the necessary privileges to perform their job duties.

• Monitor network traffic: Use network monitoring tools to detect unusual activity that may indicate insider threats.

• Conduct security audits: Conduct regular security audits to identify vulnerabilities and weaknesses that could be exploited by insiders.

• Leverage AI and machine learning: AI and machine learning can be used to analyse vast amounts of data and identify patterns that may indicate insider threats.

• Stay updated on emerging threats: Keep abreast of the latest insider threat trends and techniques to ensure that your organisation's security measures are up-to-date.

By implementing these strategies, organisations can significantly reduce the risk of insider threats and protect their valuable assets. Additionally, security teams should stay informed about emerging trends in the field of insider threat prevention.

By taking a proactive approach to insider threat management, organisations can better mitigate risks and ensure the security of their sensitive information and systems.

Read 382 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




IDC WHITE PAPER: The Business Value of Aiven Data Cloud Solutions

According to IDC, Aiven enables your teams to perform more efficiently, reduce direct infrastructure costs, and provide improved database performance, agility and scalability.

Find out how Aiven makes teams 48% more efficient, allowing staff to focus on high-value activities that drive real business results:

340% 3-year ROI – break even in 5 months (average)

37% lower 3-year cost of operations

78% reduction in staff time for database deployments


Download the IDC White Paper now

DOWNLOAD WHITE PAPER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments