How To Eliminate Insider Threats

Insider Cyber hack threats are a major security problem. For years, the primary security objective has been to protect the perimeter, the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organisation.

Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organisation.

And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.

Build a proactive Insider Threat Program

Key elements of the program should include: A cross-departmental team, including: HR, IT, CIS and Leadership.

Employee training on cyber-security policies and reinforcement of those policies. Real-time notifications at the point of violation should be a key component of the cybersecurity education program.

A user activity monitoring solution that will keep track of activities of privileged users, high-risk employees, remote vendors, anyone who has access to your systems and data. It should track and visualise users’ risk and behavior over time for faster and easier detection of insider threats.

Beware of Privilege Creep

Have clear video playback of exactly what happened before, during and after an event or alert. This decreases the mean time to resolve (MTTR) and provides organisations with irrefutable evidence that is vital to be able to take action.

Organisations typically have a good grasp of server statistics, access logs, performance, uptime, and system events. However, often gaps exist in identifying who has direct access to the server. Create credentialed logins (avoid using one general login), and employ an IT ticketing system to ensure all server-activity is very important.

Regularly Review Employee Access Controls

If there’s no need for an employee to access a particular account, revoke their permission. Additionally, consider restricting the use of remote login applications or cloud storage applications on corporate accounts.

Some organisations will perform this review yearly, but a more frequent review process (quarterly or monthly) can help mitigate insider threats.

Monitor all Data Exfiltration Points

With user activity monitoring and video playback, large print jobs from computers, USB data exfiltration, Cloud Drive uploads, sending data to personal email addresses, or sending files via Instant Messenger do not have to be investigated by combing through event logs.

With just the simple push of a playback button, the monitoring of these exfiltration points is so much easier and investigations can occur that much more quickly.

Know why Users are Installing/Uninstalling Software

Organisations use virtual desktops, non-persistent images, various software management tools, and account restrictions to control installed applications.

In most cases, these infrastructure-centric methods don’t provide information on user intent and underlying business need. Insider threat technology can eliminate these visibility gaps and allow organisations to know whether people are putting the organisation at risk.

Pay Extra Attention to High-Risk Users

Whether it’s through a conversation or the placement of a broadcast banner on a desktop, let high-risk users know they are being monitored. This will, in most cases, deter them from engaging in malicious activities.

Immediately change the password access to computers when an employee leaves. Additionally, make sure third-party services also know of this employee’s termination so they can de-authorise their account.

Ensure departing employees do not have company data on personal devices. Before a high-risk employee leaves the organisation, check whether they have company data on their personal computers, mobile phone, tablets, etc.

Speed Security Investigations

See the smoke before the fire. It is essential to be able to detect and respond to incidents and alerts quickly. Without the right security tools and programs, the mean time to detect to the MTTR can be weeks.

For example, the FBI often requests that companies not intervene with active exploits so they can gather evidence.
Integrate your user activity monitoring solution with other cyber security tools so you can provide irrefutable evidence and decrease MTTR.

Computerworld

50% of US Businesses Have No Formal BYOD Policy:

CIOs Are Neglecting Process & Most Efficient Options:

 

« Only 20% Of UK Banks Can Properly Detect Breaches
Could Britain Fight A Cyber War with Russia? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Global Cyber Alliance (GCA)

Global Cyber Alliance (GCA)

Global Cyber Alliance is an international, cross-sector effort dedicated to eradicating cyber risk and improving our connected world.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.