Hidden Truth About Cyber-Crime: Insider Threats

Barely a day goes by without reports of another major cyber-attack. Whether the target is an illicit dating site, a leading business, charity or even the British National Health Service (NHS), hackers have demonstrated a level of indiscriminate ruthlessness towards wreaking havoc and stealing confidential information.

The ramifications of these attacks are profound. In September last year, that ride-hailing firm Uber agreed to pay £133m to settle all legal action over the cyber-attack that exposed data from 57m customers and drivers back in 2016.

British Airways was hit in the summer by a breach, affecting 380,000 transactions, involving stolen personal and financial information, but not passport or flight details. Additionally, social media platform Facebook also disclosed that a security breach exposed up to 90m Facebook user accounts in September 2018.

Clearly the problem is not going to go away anytime soon. Last year’s Cyber Security Breaches Survey found that 19% of charities and 43% of businesses had reported cyber security breaches or attacks in the last 12 months alone. This figure rose to seven in 10, or 72%, among large businesses and a similar proportion, 73%, among the largest charities with incomes of £5m or more.

The result of this trend has been a major boost in spending on cybersecurity. Analysis from Gartner has suggested that over $114billion was spent on cyber measures last year, yet successful attacks keep happening. Further data suggested 66% of companies have been successfully breached in the last year alone, with severe consequences.

It’s clear that whilst business leaders recognise there is a problem, research suggests that many have a very limited understanding of the nature of the attacks. Recent research suggested that 61% of CEOs are citing malware as the main cause of data loss when in fact phishing, privilege breaches and compromised passwords are more prevalent.

This cyber blind spot means that many companies have invested in cyber prevention methods, including software and solutions, as well as staff training, yet many are unclear about where these threats arise.

The issue is further inflamed by lax security measures around privilege access, meaning that once a user gets hold of a device, username and password, there are few restrictions around what they can and cannot access.

This is something I have seen time and time again, with many large companies believing that security measures should be framed around the perimeter only. It’s easy for organisations which are not yet operating in the cloud with servers and applications to assume they are safe from harm.

The reality is that unless a business is completely disconnected from the web then it is vulnerable to attack, with malicious hackers able to steal privilege details through brute force or targeted phishing techniques.

Much of the problem stems from the fallacy that the greatest cyber threat to a business comes from an outsider attack, when in fact the opposite is the case. Part of the reason for this is relentless media coverage pointing the finger at foreign nations, international criminal networks and cyber groups determined to cause chaos by any means necessary.

Unfortunately, this assumption of safety means a significant number of IT directors and Chief Information Security Officers (CISOs) still operate believing that traditional security perimeters apply. This is despite the fact that even the use of email accounts changes the game in terms of their company’s security perimeter, putting the safety of the organisation at risk.

Waking up to the reality that the enemy lies within the organisation is the first step towards properly preventing future attacks. We call it Zero Trust, assuming that every user is a potential security threat and mitigating that threat with high levels of proficiency without disrupting productivity.

For example, if a senior member of staff suddenly logs into their account, in a different country or time zone, it’s important that security systems pick this up. It’s also critical that the organisation can alter and manage the privileged access the employee has to confidential data, so that this is reflective of their managerial level.

Failure to adopt this approach could allow a malicious hacker unprecedented access to a goldmine of confidential company information. In which case, by the time the company realises there is a problem, it is already too late.

Many large-scale organisations store critical passwords and data within the company ‘password vault’ and gaining access to this area of the business is seen as a goldmine for would-be hackers.

Yet many security providers in this space would have you believe that gaining access to the relevant passwords and breaking into the company password vault is the be-all-and-end-all of privileged access management.

The reality is companies must now look beyond the password vault in terms of adopting a Zero Trust approach, focusing instead at the individual, their device, log-in activity and question their levels of access to critical company data.

Moving forward, it’s critical that company leaders assume that all employees are a potential threat. Practical steps for this approach must mean authenticating, auditing and granting access when the company is certain that the user is who they say they are.

A healthy sense of paranoia is the only way for organisations to properly protect critical data, this means recognising that the threats can come from any employee or device, at any time.

In an increasingly dangerous digital world, assumptions about user identity is a major risk. Businesses need to think long and hard about who exactly is entering their systems, what they are viewing and the associated security risks.

The hidden truth about cyber-crime is that the majority of companies have no idea about exactly where these threats are coming from.  Failure to wake up to the reality that privilege attacks are one of the biggest risks will leave companies open to major attacks, unable to respond until it’s too late.

Information Age:

You Might Also Read:

Take An Analytical Approach To Cybersecurity Training:

 

« Obsessive Web Browsing Linked To Depression
Lack Of Tech Expertise At Board Level Puts Strategy At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.