Access and Feeds

Security: Insiders Are the Number One Culprit Behind Security Issues

By Dick Weisinger

Insider security threats are possibly the most difficult types of security incidents for companies to thwart. More than half of companies in a Ponemon survey say that it is nearly impossible to prevent an insider attack.

Insider attacks can range from employee negligence to malicious actions often with the goal of financial gain, fraud and IP theft. The majority of problems are due to human error or incidents like responding inadvertently to phishing or other types of social-based attacks.

Joe Payne, Code42 president and CEO, said that “organizations are overlooking the most harmful data security threat: their own employees. While security leaders likely are aware of the problem, they may not grasp the sheer magnitude of it. And most have fallen behind in effectively detecting and responding to insider threats.”

Kim Crawley, cybersecurity blogger/journalist, said that “the most dangerous aspect of insider threats is the fact that the access and activities are coming from trusted systems, and thus will fly below the radar of many detection technologies.”

Larry Ponemon, Chairman and Founder, Ponemon Institute, said that “the vast majority of security threats follow a pattern or sequence of activity leading up to an attack, and insider threats are no exception. Many security professionals are already familiar with Lockheed Martin’s Cyber Kill Chain and the MITRE ATT&CK Framework, both of which describe the various stages of an attack and the tactics utilized by an external adversary. Since human behavior is more nuanced than machine behavior however, insider attacks follow a slightly different path and, therefore, require modern approaches to combat.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on DotNetKicks.com
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *

*