Interviews

Risk of rogue insiders surveyed

by Mark Rowe

While businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators, it is claimed by an IT security product company. The survey of 1,000 IT professionals, by OnePoll on behalf of LogRhythm, found that more than a third (36 percent) of IT professionals believe employees would access or steal confidential information, yet 38 percent do not have, or know of, any systems in place to stop employees accessing unauthorised data. Surprisingly, less than half (48 percent) regularly change passwords to stop ex-employees gaining access and the most commonly used deterrent is the threat of disciplinary action (64 percent).

However, in a corresponding survey of 200 employees, almost half (47 percent) admitted to having accessed or taken confidential information from the workplace, with 41 percent using passwords and usernames to access data after they had left a company. Notably, of those who had been caught, a quarter said nothing happened, while 67 percent were spoken to, but no disciplinary action was taken. And 79 percent claimed their illegitimate actions had never been identified.

Ross Brewer, pictured, is vice president and managing director for international markets at LogRhythm. He said: “While it is clear that the risk of rogue insiders is making its way up the corporate agenda, what’s not clear is how organisations are dealing with nefarious employee activity. In LogRhythm’s 2013 research, just 19 percent believed employees would steal data, a number which has nearly doubled in the last year, indicating that businesses are slowly waking up to the realities. What is baffling is that, despite this, the majority of organisations are still not putting adequate systems in place. Indeed, it is not only staggering that such a large number of employees have never been caught accessing confidential data, but that those who have been have often got away with it scot free.

“What we can take from this is that most organisations still have very little idea of what is happening across their networks. Even when faced with daily reports of internal security threats, such as the recent Target breach, as well as government initiatives to increase awareness, businesses are still inclined to turn a blind eye. At a time when the threat landscape is so vast and the repercussions are so big, this is simply unforgivable.”

According to the survey, while more IT professionals cite the insider threat as a bigger security risk (31 percent) than external threats (29 percent), the general consensus seems to be that not enough importance is being placed on containing it, with 37 percent feeling like their business could do more to safeguard information from employees. Considering that a third also have no idea whether or not they have suffered a breach before, it appears there is still a long way to go.

“It is astounding that a third of IT professionals cannot say whether or not their organisation has ever suffered a breach – surely this knowledge should be the bare minimum? Without knowing what happened yesterday, businesses have little hope of protecting their networks today. Businesses clearly need to increase the level of visibility that they have into their networks in order to spot any questionable activity. By tracking every single event that occurs within the IT infrastructure – both from internal and external sources – and defining ‘normal’ behaviour for users and systems, organisations will be able to identify and remediate any breaches as soon as they occur. Only by acquiring this in-depth knowledge and strengthening access control strategies, will businesses be able to truly defend themselves.”

The IT firm encourages organisations to make better use of the machine data generated throughout an enterprise so that potential threats can be identified before they have a chance to escalate. Using security intelligence platforms such as next generation Security Information and Event Management (SIEM) as part of an integrated Protective Monitoring strategy enables automated, centralised collection and analysis of log and machine data that ensures anomalies are identified as they occur. Developing this requires the ability to see even minor changes that may occur across the IT estate, such as files being altered or copied to portable storage devices.

The full survey results can be downloaded here: http://www.logrhythm.com/Portals/0/resources/LogRhythm_Survey_15.42014.pdf

Related News

  • Interviews

    Platforms’ dangerous game

    by Mark Rowe

    Businesses still using consumer-grade comms platforms are playing with fire, says Morten Brøgger, pictured, CEO of secure messaging platform Wire. When the…

  • Interviews

    Ransomware attacks in 2021

    by Mark Rowe

    Simon Roe, Application Security Product Manager at the cloud and wireless threat detection platform Outpost24 looks at ransomware and how to protect…

  • Interviews

    Cyber workshop

    by Mark Rowe

    ENISA and ISACA hosted a joint workshop in Berlin on Tuesday, June 11, to address cybersecurity challenges for national regulators, telecom operators,…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing