While nation-state threat actors and external hackers often garner the headlines, insider threats are an often-overlooked threat vector. Rockwell-Boeing, Anthem Healthcare, and Capital One are just a few organizations with damaging data breaches caused by insiders. Insiders such as privileged users, contractors and vendor partners, and trusted executives often have access to the “keys to the kingdom” and know system and process weaknesses to exploit.
A 53% majority have confirmed insider threats against their organization in the last 12 months, with 27% stating that insider attacks have become more frequent, according to Cybersecurity Insider’s 2018 Insider Threat Report. Ponemon Institute found that insider threats do more damage for longer than external threats, with an average cost of $8.7 million. Detecting and blocking insider threats and inadvertent insiders are crucial to reduce lost productivity and incident response costs. Enable pragmatic cybersecurity processes to reduce exposure to insider threats and accelerate a rapid response when minutes matter.
Most information security experts agree that employees and vendors form the weakest link when it comes to organizational information security. A holistic definition of insider threats enables security organizations to better prepare for the largest possible threat vectors that can lead to costly attacks.
“An insider threat is any breach that is caused by or facilitated by an insider, whether it is an accidental insider or malicious insider.”
- Joseph Blankenship, Forrester Research Principal Analyst
These types of internal threats can be particularly challenging to detect, especially if organizations have primarily focused on bolstering external security.
Insider threats often remain undetected for months or years, causing lost revenue, disrupted operations, sagging brand reputation, and public distrust. It is important to understand the types of insiders and their motivations to provide context for prevention. According to Security Insider, there are five fundamental types of insider threats:
Nearly two-thirds (64%) of insider threats are caused by users who introduce risk due to careless behavior or human error, according to Dark Reading. Whether intentional or inadvertent, would you even know if someone inside your network compromised or leaked sensitive data?
Traditional approaches such as security awareness training provide a good foundation, but are insufficient given the possible financial motivation and misconfiguration risks by insiders. Some industry sectors pose more internal risk than others, according to the Verizon Data Breach Investigation Report 2019.
Surprisingly, the healthcare industry is the least likely to encrypt its data, according to the Ponemon Institute. As shown below in Figure 1, customize your insider threat program to your industry risk, sensitive assets, and organizational risk appetite.
Use a pragmatic approach to cybersecurity to identify avenues to detect and stop insider threats. Some countermeasures against insider threats include:
Protect sensitive data with role-based access controls: in a nutshell, role-based access controls (RBAC) provide rights or computer access to a user or category of user based on their work function, and no more. A well-thought out plan for identity and access management (IAM) can create repeatable processes while limiting access only to those with a need-to-know. Many compliance frameworks such as PCI DSS (Payment Card Industry Data Security Standard) and HIPAA (Healthcare Insurance Portability and Accountability Act) require methods to limit sensitive data access.
Implement data encryption: encrypting or encoding sensitive data can create a barrier to attack while deterring insider access. While encryption of data at rest and in transit is a best practice, the global adoption rate for encryption is 45% - leaving much room for improvement.
Address privileged access management (PAM): privileged users are those such as system admins with elevated access to systems and services. These “super users” are prime targets for attackers looking to gain access to crucial servers or pivot to other internal networks or supply chain partners. Limiting privileged access also reduces damage in the event of a data breach.
Identify anomalous behavior: use machine learning to understand normal operating behavior, then identify anomalous activity that deviates from the baseline, and to prioritize action based on alerts. User and entity behavior analytics (UEBA) from Netsurion can detect an employee or contractor’s suspicious activities, such as logging in at unusual times or attempting to access restricted files or intellectual property.
Link cybersecurity and physical security: cybersecurity insider threats are often intertwined with breaches in physical security. Some indicators of compromise include employees who are suddenly eager for additional after-hours work, volunteer for confidential projects outside their work scope, or use a flash drive when the organization does not permit USBs.
Add comprehensive visibility and monitoring: constant monitoring and alerting with a Security Information and Event Management (SIEM) platform can detect both internal and external threats in near-real-time. Log monitoring and alerting enables employees to go about their work with minimal intrusion and privacy concerns.
Insider threats occur for numerous reasons, from disgruntled staffers to financially motivated insiders stealing data, to unwitting employee mistakes. Understand your most valuable assets to prioritize insider threat protection that balances security and privacy as you prevent, detect, and respond to internal threats.
Increase security awareness training on insider threats and include an “if you see something, say something” approach. Enhance visibility into user behavior with continuous monitoring, internal threat correlation, and user behavior coupled with SIEM to elevate your security posture and speed up time to detection. While insider threats are costly, compensating solutions need not be expensive or time consuming for you or your supply chain partners. SOC-as-a-Service from Netsurion is one practical avenue to shore up internal gaps that rogue employees and inadvertent insiders can exploit.
Subscribe to Lumifi's Daily Cybersecurity News Curated by a CISO
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.