An insider threat is any malicious or unintended security risk posed by an organization's trusted individuals having either legitimate or unauthorized access to the organization's resources. Insider attacks can be initiated not only by current employees, but also by former employees, partners, or contractors who may or may not be authorized to access company resources.
In this blog, we'll classify insider threats based on their motivations, and lay out an eight-step plan to initiate an insider threat prevention program in your organization.
Based on their motivations, insiders can be classified into four types.
Job seekers are a category of people who seek a change in career, have recently been hired at another company, or want to start their own company. Some of the characteristics exhibited by job seekers are frequent absenteeism and medical emergencies. They also publicly express their discontent towards the organization.
The attack becomes more dangerous when the job seekers recruit other employees into their schemes, and they tend to steal intellectual property from other servers and departments. This kind of behavior is exhibited by job seekers who have privileged access to sensitive information such as engineers, scientists, programmers, sales personnel, etc.
As the name suggests, employees who are not satisfied with the organization fall under this category. They may be disgruntled due to a poor performance review or inadequate compensation, or believe the organization doesn't treat them fairly, and want to take revenge. These unhappy employees tend to speak ill of the company and display vindictive behavior.
Unhappy employees who possess the technical acumen to damage the IT infrastructure of the organization may carry out activities such as planting malware in systems or rendering critical servers unavailable, an attack known as IT sabotage. IT administrators, database administrators, and programmers who are technically sound and privileged users are more likely to carry out this insider attack.
Data uploaders are the type of employees who do not diligently follow the organization's data protection regulations, and upload data to unauthorized platforms, whether unintentionally or intentionally.
This type of insider is recruited unethically by another organization for procuring sensitive data. The insider may be blackmailed or offered monetary rewards for providing the data. Generally, employees in the lower salary range and who are not technically sound, such as receptionists and data entry operators, are more likely to indulge in insider fraud since they're financially motivated.
Organizations need to formulate their own insider threat detection program to evaluate risks, clearly define IT security policies, and train and monitor the employees to minimize the risks of insider threats. Here’s a basic outline for organizations to get started on an insider threat program.
For a compelling business case, address the following questions:
With respect to the insider threat program, some of the main stakeholders are:
The HR team and insider threat team must work closely to map employees' physical behavior with their cyberactivities to recognize potential attackers.
Set clear policies for employees to understand what is acceptable behavior for data usage.
To restrict data access based on employee profile, one or more of the following methods can be implemented:
All the data assets in the organization must be ranked from the most to the least risky.
Risk: The risk involved in a data asset.
Vulnerability: A point of security compromise for an endpoint in a network.
Threats: Any opportunity or motive that can lead to compromise of the data asset. A threat to a data asset can be predicted by analyzing historical trends.
Business impact: The negative impact on a business in case of a data breach.
For a systematic approach towards data protection:
Most organizations conduct pre-employment screenings and background checks before the employee joins the organization. It's of the utmost importance to monitor the following traits when the employee is on the job:
Training sessions should be conducted on the best cybersecurity practices, the importance of reporting suspicious employee behavior, compliance and regulatory requirements, privacy policies, and how third parties may recruit insiders. Customizing these sessions based on the employees' roles and the kind of data they have access to will lead to a more effective program.
The following documents enable organizations to establish a secure environment that is in compliance with IT security regulations:
Employ an able IT team, along with tools like Log360 that can do the following:
Let's consider the following scenario.
PRIXIE is a global e-commerce platform that sells branded apparel. Roodie is a customer service executive at PRIXIE whose job involves addressing customer queries regarding package delivery date, exchanges, refund processing, and discounts. She has always fancied owning fashionable clothes but cannot afford it.
One day, overcome by greed, she takes advantage of her position and changes the delivery addresses of several customer orders to her own, and excitedly awaits the delivery of the shipments. However, she doesn't realize that PRIXIE uses Log360 to monitor privileged accounts. Log360 employs user and entity behavior analytics (UEBA) to observe the behavior of employees, and establishes a baseline profile for each of them. Any deviation from regular behavior increases their risk score and alerts the IT administrators.
The IT team at PRIXIE is alerted about Roodie's unusual behavior in real time as she modified several addresses in the customer database within a short span of time. They revoke her privileges immediately and restore the correct delivery addresses, protecting PRIXIE from falling prey to insider fraud and potential damage to its reputation.
Follow the eight-step plan to get started with your insider threat protection journey. ManageEngine's Log360 can make insider threat detection and prevention a seamless experience.
Log360 collects and analyzes log data from devices across your network in real time. Its reporting console, correlation engine, real-time event response system, and search engine work together to provide even the smallest details on your network's security.
© 2020 Zoho Corporation Pvt. Ltd. All rights reserved.