Protecting Your Company’s Data Against Insider Threats

Perhaps because of their incredible scope or their shocking prevalence, data breaches are creating a lot of general  interest.  It seems that a new event happens every week and even though companies rightly fear an attack from an external source, internal threats pose a hidden risk, accounting for a substantial number of data breaches.

While we hear about major incidents in the media, the truth is that no business is immune from the danger of insider threats. Fortunately, companies are quickly recognising this new dynamic.

According to a recent report by CA Technologies, 90% of organisations feel vulnerable to insider attacks. Indeed, the financial impact, the loss of core IPs, and the damage to brand reputation are cascading problems that can shake the very foundation of any SME.

However, since insiders, including employees, suppliers, and partners, are already in the organisation’s trusted network, standard cybersecurity measures usually designed to defend against outside attacks aren’t adequate to protect the organisation from these accidental or malicious “enemies within.”
 
Therefore, organisations need to look into user activity and behavior monitoring and adopt a user-behavior driven data loss prevention strategy to effectively defend against insider threats. Here are ten tips to develop an insider threat prevention strategy:

1. Implement a Risk Assessment Methodology

When it comes to data security, operating without a plan is most certainly planning to fail. In today’s digital environment where data breaches and leaks are uncomfortably common, every organisation needs a holistic approach to data security.

In other words, the only way to effectively protect data is to analyse and evaluate every aspect of a company’s data landscape and to adopt a methodology for continually assessing the risk protection strategies already in place.

This includes identifying vulnerable assets and weak access points, while also observing risk trends and mitigating opportunities to fail.

While implementing a risk assessment methodology requires an all-in approach from the entire organisation, implementing the right technology, like comprehensive employee monitoring software, can be the natural next step to identify and prevent a devastating data loss event.

2. Monitor Employee activity, and respond to Suspicious Behavior

Advances in machine learning and other ancillary technologies allow companies to establish user profiles so that abnormal behavior can be identified and investigated.

For example, frequent late shifts, printing more documents than normal, or copying substantial amounts of data from external drives can be an indication of possible malicious behavior.

Of course, other, more-subtle activity can be a red flag as well. Powerful employee monitoring software equipped with Optical Character Recognition (OCR) and context analysis capabilities can detect when employees research topics related to hacking, an uptick in complaints or angry sentiments expressed through internet chats, or a sudden decline of work-related activities. These signals can all serve as a precursor to the intention to steal data.

While these behaviors may not necessarily indicate a data breach, they could mean everything for early detection, and they are worthy of response and investigation.

3. Collect and save Data for Forensic Examination

When a data loss event does occur, companies need to understand what happened so that they can improve their practices and seal the security holes.

In short, there is both an educational and a deterrence component to data security, and both require digital forensics.  

Therefore, recording sessions when employees access sensitive information, maintaining logs of data access, and sustaining digital activity trails can equip IT admins with the investigative capabilities necessary to evaluate the threat and to fortify protocols to prevent it from happening again.

4. Minimise the threat by limiting access to safe resources

The internet is an expansive ecosystem with a myriad of websites and apps that, taken together, represent both an opportunity and a threat to organizations striving to protect their data.

To limit their exposure, companies should determine and implement a whitelist and a blacklist for websites or apps that are useful or even dangerous. Moreover, for the inevitable gray area between white and black lists, IT admins should be notified when unknown apps are being accessed so that they can evaluate the use and take action if necessary.

5. Classify sensitive data and implement perimeter rules

Not all data is created equally, and some data is more sensitive than others. More importantly, not all employees need to have access to all the organization’s data. Classify sensitive data as such, and limit access to employees who actually need that information.

In a very real way, employees should be on a need-to-know basis, and today’s software can ensure that they only have access to what they need to see. Perhaps more importantly, sensitive data can be protected with additional security measures like tagging and fingerprinting that can, among other features, stop users from sharing secure data.

6. Automate Security Policies to take Proactive Action

Whether they act maliciously or accidentally, employees can quickly compromise their company’s data. Fortunately, by deploying the right software, any organisation can automate policies that proactively prevent this from happening.

For instance, it’s possible to prevent employees from opening PDFs from unknown email senders and to block the upload of company files to personal storage sites like Dropbox or Google Drive.

As a best practice protocol, companies should implement privileged user monitoring to maintain extra vigilance and scrutiny for administrators and other privileged users, ensuring that they don’t create new system rules, open backdoor accounts, increase their system privileges, access sensitive personal information, or edit configuration or system files.  

7. Implement Third-Party vendor Monitoring

Maintaining a modern IT infrastructure frequently involves providing third-party vendors with network access, which can compromise user data. According to a 2018 study by the Ponemon Institute, more than half of companies that experienced a data breach attribute the cause to a third-party vendor.

The ability to access system preferences allows external vendors to steal company data as well as damage IT infrastructure, but monitoring third-party vendors can protect against inappropriate data use or theft. In addition, companies can suspend a vendor’s credentials, so that they cannot access the network unless they are actively working on a project.  

Collaborating with third-party vendors may be a veritable necessity of the digital age, but that doesn’t mean that sensitive data needs to be compromised in the process.

8. Establish compliance and security Standards

In today’s regulatory environment, data loss isn’t just an existential threat, it’s a practical problem with legal and financial consequences. The implementation of Europe’s comprehensive GDPR legislation, the medical sector’s HIPAA guidelines, and other forthcoming regulations significantly raise the stakes for data protection.
Identifying and examining their protocols can yield helpful strategies for preventing data loss, while simultaneously ensuring that companies remain compliant with their increasingly stringent demands.

9. Integrate DLP and SIEMs for better coverage

When examining a company’s network infrastructure, it’s critical to attain as much security coverage as possible. Therefore, choose a solution that provides a unified insider detection and data loss prevention feature set.

A responsive, real-time DLP framework that seamlessly integrates with SIEMs provides centralized insight into data management protocols and offers real-time alert management for complete security coverage.

10. Train & Educate Employees, Contractors, and Suppliers

Ultimately, data protection is a priority that requires consistent training and retraining to be effective. Although it may look different for each company, outlining the boundaries with a comprehensive Acceptable Use Policy is a natural next step.

Best practice guides, business etiquette initiatives, and onboarding training can reinforce and reproduce company values. When combined with instructive technology that provides on-time warning messages and behavior-shaping monitoring tools, companies can create a dynamic learning environment that educates their workforce on the practice and priority of data security.

In today’s data landscape it’s more important than ever for companies to protect against the insider threats lurking within their companies. To be sure, this starts with hiring the right people who support and adopt the organisation’s data security mindset.

Implementing the right policies and integrating the right technologies can make all the difference. Comprehensive employee monitoring software is the place to start, providing valuable metrics and instituting guidelines to protect against internal threats.

IT Security Central:

You Might Also Read:

Breakthrough Technologies To Combat Insider Threats:

 

« Breaking Down Five 2018 Breaches
UK Launches Long-Awaited Cyber Skills Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association (NHCAA) - USA

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Finnish Security & Intelligence Service (SUPO)

Finnish Security & Intelligence Service (SUPO)

The Finnish Security and Intelligence Service is a government agency tasked with combating serious threats to national security in Finland.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

CyberGate Technologies

CyberGate Technologies

CyberGate Technologies is a world-class, customer focus cyber security service and consultancy company operating the UK, Europe, Middle East, and Africa.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

Anthropic

Anthropic

Anthropic is a Public Benefit Corporation, whose purpose is the responsible development and maintenance of advanced AI for the long-term benefit of humanity.