Mitigating The Growing Insider Risk

Organizations continue to have significant concerns about the risks posed by their insiders, and for good reason: no one outside the organization knows the ins and outs of critical networks, systems and internal security measures like an inside employee.

Many factors, including the ever-changing digital landscape, make insider risk a bigger threat than ever before. 

According to a recent study from the Chartered Institute of Information Security, some cybersecurity professionals have been selling their services on the dark web. In the wake of layoffs and, per Gartner, an industry exodus sparked by work-related stress, the fear that an ex-employee might offer sensitive information to bad actors is a legitimate one. In fact, according to IBM Security, 6% of all data breaches are initiated by malicious insiders, and these breaches are often the costliest.

In many cases, these insider cyber-attacks are the result of disgruntled employees, with many instances of insider theft happening in the 30 days before an employee’s departure.

The impact of insider risk is very real, taking, on average, 10 to 11 months to identify and contain breaches stemming from insider risks, costing resources and negatively impacting overall revenue. What’s even more concerning, insider risk doesn’t require explicit malintent. So, in addition to worrying about employees going rogue, organizations must also worry about good old-fashioned negligence. Looking at the big picture, it’s more urgent than ever for organizations to ensure they apply the right technology at the right time to mitigate insider risk.

It’s Time To Be Proactive

Risk mitigation is a journey and not a destination. While no one can claim to fully mitigate all risk, there are some effective and proactive measures organizations can take toward mitigating insider risk. This starts with layering two critical technologies within organizations: user activity monitoring (UAM) and behavioral analytics. 

In simplest terms, UAM passively monitors employee activity so organizations can collect data to better understand baseline behavior and, in turn, proactively flag any departures from it. Risky behaviors include working unusual hours, stockpiling large amounts of information, or attempting to access restricted data—to name a few. But other instances of concerning activity could include web searches for new jobs or resume-writing tips.

By integrating UAM with behavioral analytics, organizations can gain the necessary insight and quantify the risk of anomalous behavior as compared to the user themselves or their respective peer group.

An employee who doesn’t have access to very sensitive information would have a low baseline risk score. But if their behavior changed, the risk score would rise. These scores help security analysts quickly and effectively respond to changes in behavior that could indicate a looming insider threat. 

The Importance of Employee Privacy

While technology can minimize insider risk, it can also have the opposite effect if not implemented correctly, carefully, and communicated to employees. To some, UAM can sound as though a company could be spying on employees to keep tabs on productivity. In reality, this is not the case with more effective UAM technologies. These solutions are designed at the core to do less spying and more risk scoring and quantifying.

Truly effective UAM provides enhanced visibility of risks while protecting employees and organizations from the intrusive spying features off less effective UAM tools.

Using the right solutions helps organizations as a whole meet the goal of being more informed, and more secure. But unless this is proactively explained to employees, it could undermine that very goal. 

When an organization introduces a UAM program, HR and legal must be part of the conversation from the beginning. Awareness training and product overview sessions should be provided to the C-suite and employees alike. Demonstrate the use cases and behaviors that drive the data collection policies and ensure all policies have been approved by the board and align with data privacy guidelines. While capturing logins and access to data is useful for company cybersecurity, there’s no reason to monitor logins to personal social media or bank accounts. Similarly, while analysts should be able to see digital behavior data and an employee’s overall risk score, as they should not be privy to any personal information.

Effective insider risk programs implement guardrails to protect employee privacy while also ensuring protection exists for sensitive organizational data. If the proper governance and oversight is not included, the program runs the risk of undermining its mission. Employees must be fully informed about the insider risk program from day one.

The Bottom Line

Insider risk is a real and growing threat for organizations across industries: laid off employees may turn to the dark web to earn extra cash, disgruntled employees may try to steal data on their way out, and even the best-intentioned employees may make extremely harmful mistakes. Insider risk is not a matter of if, but when.

Insider risk can be costly, but it can also be mitigated. When it comes to implementing an insider risk program, there’s no time to waste. Organizations must put technology in place to proactively identify risky behavior and quickly remedy any threats that arise.

Image: 

Mike Crouse is Director of Insider Risk at Everfox

You Might Also Read: 

Zero-Trust: Protecting From Insider Threats:

DIRECTORY OF SUPPLIERS - Insider Threat Protection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Make Sure Your Disaster Recovery Plan Works When You Need It Most
The AI Future: Three Tips For SMBs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

OSIbeyond

OSIbeyond

OSIbeyond provides comprehensive Managed IT Services to organizations in the Washington D.C., MD, and VA area including IT Help Desk Support, Cloud Solutions, Cybersecurity, and Technology Strategy.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

TempoCap

TempoCap

TempoCap is a European growth-stage technology fund with offices in London and Berlin. We invest across a variety of high- growth sectors including cybersecurity.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.