Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Cybersecurity is mainly outward facing.  Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

A Profile of the Insider

There are two kinds of insider threats:  the malicious employee, contractor, or vendor and the unwitting victim of a hacker attack.  IBM in its 2016 Cyber Security Intelligence Index says that 60% of cyberattacks came from insiders.  Three-quarters of those were intentional.  Case in point - monitoring what goes on inside your network is just as important.

The employees to watch for are:

  • Disgruntled employees
  • Employees  with access to sensitive information that can be monetized
  • Phishing Victims
  • Employees who are just careless with regards to security

Below we show specific events that an employer should monitor in order to detect and prevent insider threats. Remember, every organization is different, so work backwards to understand what files and systems you want to protect and then check who has access. Many times, we’ve seen companies realize that an audit was never performed on user access and many more people than they thought had access to sensitive information.

Monitoring Employee Behavior - Behavior to Look Out For

Deleting Files. Employees delete files for many reasons, however, those files are company property and most likely could have been used at a future time. Additionally, deleting files in a system can cause structural IT damage. Alerts should be set for deleted files, based on seniority, access and file type.

Delete or Access Key Accounts. Not everyone needs access to everything. Sometimes in order to not inhibit particular work processes, employees are given access to files that are stored with other information not necessary for their tasks. When employees access files that do not pertain to their daily tasks and roles, the access should be recorded and depending on the sensitivity of the file, administrators may need to be alerted.

Copying data to a USB. It’s the easiest way to walk away with a chunk of data. All USB inserts and information copied to USB drives should be monitored.

Sending email to a competitor. We all know who’s hands we wouldn’t want our data to land in. Create a list of competitors and domains you would find suspicious if data was sent to from a work computer.

Printing confidential information. This can be dangerous for two reasons - one it’s easy for an employee to transfer data to a third party but it can also leave a client’s information just lying around the office for anyone to see.

Granting access. Some industry regulations, such as SOX and HIPAA, require that employers have a certification process. This is a formal, documented process for approving and granting employees access.  But certain individuals have access to grant themselves elevated access.  Or a person can get a hold of the credentials of an administrator.

Keyboard logging. Keyboard logging while popularly used by malicious users from the outside can also be a valuable tool for real-time alerting (for example if someone reached how to access blocked files) and even more helpful when doing IT forensic investigations to understand the full story.

Applications Used. Applications used should be monitored for two reasons. The first reason is because insider threats are more likely to use personal applications to transfer data. So if you see someone is logging into their g-mail account at work more than usual - that’s a red flag. Another reason is to compare one user’s application use to others within the department. If someone is consistently logging into applications that no one else in the department is using - that can be a red flag as well.

What  actions should be taken if users engage in high-risk behavior?
Each type of behavior needs to be given an appropriate risk level. For example, a very- high risk action could be putting company financials onto a USB drive while a low risk action could be copying an unreleased brochure to a USB drive. In many cases, if the action is low risk, its best to warn the user and notify them that their behavior could be of risk to the company. This has been proven as a good preventive measure from having the user repeat the action. If the behavior is deemed as high risk, blocking the action or locking the employee’s account is acceptable protocol.

After-the-Fact Forensics

While taking all the above preventive measures should keep your organization secure - employees can get creative. Logging employee actions is key to the after the fact investigation. Not only does it help you figure out what en employee has taken or deleted, but also the weak point in your security setup. Having this information allows you to protect yourself in the future. Additionally, the data can also be helpful in case of any legal action.

On the Need to be Secure

Looking out for and being able to track the aforementioned behavior allows employers and administrators to add an extra degree of security to their IT infrastructure. The amount of incidents surrounding insider threats is on the rise every year and still the majority of organizations haven’t put in the proper procedures to detect and prevent insider threats. Don’t let your organization get the bad rep from a data breach or have their IP stolen - start putting the proper measures in place today.


Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.