Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

Steps To Combat Insider Threats

Written by  Feb 13, 2020

Your organisation are generally well prepared for threats from outside the company. But are you ready to address threats from within?

Most, if not all, organisations are vigilant about safeguarding against threats that can penetrate endpoint systems via email, websites, and other known and unknown pathways. But what about threats that come from within your organisation? Even worse, from those who you assume can be trusted?

What Are Insider Threats?
"Insider threats" are infrequent but real. Although we tend to think of vengeful former employees or contractors on the lookout for ill-gotten gains, the truth is that many insider breaches are wholly unintentional. Data breaches can be accidental or unintentional — caused by user carelessness, negligence, or compromised credentials — or of course deliberate malicious insider activity.

When it comes to preventing mishaps that lead to unintentional breaches of organisational systems, user education is a top priority. Make security training an essential part of the onboarding process. When systems are updated, or new processes or procedures put in place, education and training sessions will lessen the likelihood of attacks from within due to errors or negligence.

But how can you anticipate malicious attacks from within and prevent them and the damage they cause before it's too late?

warning sign

Identify the Early Warning Signs
Business owners, IT staff, and cybersecurity professionals must always be alert to the possibility of insider threats because keeping data safe from those who have permission to access it depends on rapid identification of and response to breaches. Malicious insiders have the upper hand; they're already past your defences. With authorised system access, they have sensitive data at their fingertips, know the organisation's weaknesses, and can easily acquire valuable assets.

Watch for Unhappy Employees
Are employees dissatisfied? Remember that unhappy employees might be easily tempted. Keeping an eye on employees and considering their state of mind is more than just good HR practice — it is a good cybersecurity policy as well.

So, reach out to your employees. Meet with them, speak with them. Try to understand how they feel about the state of your organisation. Fixing issues before they boil over into malicious cyberactivity can save the company from the trouble that would result from an insider breach.

Phishing ServiceAlso see: What is Phishing?

Revoke Access Immediately upon Termination
Former employees who still have access to company networks and data pose a significant security threat — those who were let go from their positions pose particular risks.

Institute IT procedures for employee termination and adhere to them thoroughly and promptly. Notify IT immediately when a user's employment has ended and ensure that all access privileges to networks, data, and computer equipment are quickly revoked.

Keep an Eye Out for Financial Distress
Insider breaches have been known to be motivated by financial need — and greed. Whether an employee is experiencing a credit squeeze, didn't receive an anticipated promotion or raise, or is facing unexpected pressures from a health crisis or other cause, outside pressures may lead an individual to generate much-needed cash however he or she can.

In addition to posing a cybersecurity threat, financial stress affects employee productivity and health. HR professionals should ensure that managers are aware of the signs of financial stress and alert them to worrisome employee behaviours that may result.

cloud2Also see: Is The Public Cloud Safe?

Watch for Sudden, Unexplained Changes in Interests or Behaviours
Is an individual suddenly working late or odd hours? Be aware of out-of-the-ordinary, unexplained behaviours. Employees who have a sudden interest in accessing classified material or information outside of their current assignments should obviously raise a red flag. Investigate why they might be interested. Don't assume you can trust them, no matter what their role in the company might be.

Uphold Least-Privilege Access
Best practices for preventing insider threats start with standard practices for overall employee risks: Be aware of suspicious or erratic behaviour. Follow termination procedures to the letter. Notice dissatisfaction and try to address it.

Today, to reduce the attack surface for insider threats, organisations are increasingly limiting employee permissions based on the principle of least-privilege access. Each user has access privileges only for the systems and data needed for the job. Likewise, each system has the least authority necessary to perform its assigned duties.

The zero-trust concept takes the least-privileges approach to combatting insider threats still further, based on the principle that no person or device should be trusted, whether it is within or outside of the network perimeter. It requires every person and/or device to be validated and authenticated to access each resource. Microsegmentation stops the spread of malicious agents, should they get in.

As a result, fewer employees can take malicious actions, fewer accounts can be hacked, and fewer people can make errors that result in breaches.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Advertisement

Popular Cyber News

Jan 30, 2020 Cyber Security

UK Cyber Security is Booming

The UK’s cyber security industry is currently enoying a three-year boom, with the number of active security firms in t...

Jan 30, 2020 Cyber Security

Phishing A Major Factor in UK Cybercrime

Of all reported incidents in 2019, almost half were related to phishing attacks. ...

Mar 05, 2020 Cyber Security

Tesco and Boots Loyalty Card Schemes Affected by Security Issues

UK retailers Tesco and Boots are dealing with the after affects of cyber security issues that may have affected thousand...

Feb 08, 2020 Cyber Security

Millions of UK Businesses don't have a Cyber Insurance Policy

According to a survey conducted by Insurance firm Gallagher, millions of businesses operating in the UK don't have basic...

Feb 13, 2020 Cyber Threats

Steps To Combat Insider Threats

Your organisation are generally well prepared for threats from outside the company. But are you ready to address threats...

Feb 10, 2020 Cyber Security

The Cyber Security Fight Won't Stop

The controversy over the decision to allow Huawei technology to be used in the UK’s 5G networks is a very high-profile...

Feb 07, 2020 Cyber Threats

British Police Warn: Cleaners Are A Cyber Threat

British police have reportedly warned of a cyber threat posed by a not often thought about data stealer, namely the use ...

Feb 29, 2020 Cyber Security

Wi-Fi of More Than a Billion Devices Can Be Exposed

A billion-plus computers, phones, and other devices are said to suffer a chip-level security vulnerability that can be e...

Feb 04, 2020 Cyber Security

NHS Employs Supplier Security Audits to Improve Cyber Security

NHS Shared Business Services and its cloud partner Virtualstock have enlisted cyber threat intelligence and risk assessm...

Feb 25, 2020 Cyber Security

The Top Cyber Security Companies in the UK

Investing in the right cyber security for your company is more important than ever, but which are the top UK cyber secur...

Feb 28, 2020 Cyber Threats

UK Prepares ‘National Cyber Force’ To Tackle Terrorists and Other Threats

The UK is preparing the official launch of a specialist cyber force that will target terror groups and hostile nation st...

Feb 19, 2020 Cyber Security

Cybersecurity Jobs Are Not Going To Be Filled

CISOs around the world expect a serious lack of global cybersecurity talent which will worsen in the next five years, ac...

Feb 28, 2020 Cyber Threats

DVLA Say Cyber Criminals are Targeting UK Motorists

The Driver and Vehicle Licensing Agency (DVLA) has warned that cyber criminals and scammers are targeting unsuspecting d...

May 22, 2020 Cyber Security

EasyJet will be sued over customer data breach

Legal firm PGMBM, a specialist in group legal action, has issued a class action claim under Article 82 of the General Da...

Mar 23, 2020 Cyber Security

Thousands of Netflix and Other Streamers Accounts are Being Stolen

With a massive surge in home use of video and music streaming services such as Amazon Prime Video, Apple Music, Netflix ...

Mar 27, 2020 Cyber Security

Hospitals worldwide offered free security software

As cyberattacks against hospitals surge during the coronavirus crisis, technology companies are stepping up to alleviate...

Advertisement
Symantec Home 120x60

Advertisement