security & privacy the biggest cybersecurity...

4
SECURITY & PRIVACY The Biggest Cybersecurity Threats Are Inside Your Company by Marc van Zadelhoff SEPTEMBER 19, 2016 When security breaches make headlines, they tend to be about nefarious actors in another country or the catastrophic failure of technology. These kinds of stories are exciting to read and easier for the hacked company to admit to. But the reality is that no matter the size or the scope of a breach, usually it’s caused by an action, or failure, of someone inside the company. The role that insiders play in the vulnerability of all sizes of corporations is massive and growing. In the 2016 Cyber Security Intelligence Index, IBM found that 60% of all attacks were carried out by insiders. Of these attacks, three-quarters involved malicious intent, and one-quarter involved inadvertent actors. IBM Security research also found that health care, manufacturing, and financial services are the top three industries under attack, due to their personal data, intellectual property and physical inventory, and massive financial assets, respectively. However, while industries and sectors differ

Upload: others

Post on 12-Mar-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURITY & PRIVACY The Biggest Cybersecurity …ummaha.weebly.com/uploads/4/5/1/3/45136799/the_biggest...SECURITY & PRIVACY The Biggest Cybersecurity Threats Are Inside Your Company

SECURITY & PRIVACY

The Biggest CybersecurityThreats Are Inside Your Companyby Marc van Zadelhoff

SEPTEMBER 19, 2016

When security breaches make headlines, they

tend to be about nefarious actors in another

country or the catastrophic failure of technology.

These kinds of stories are exciting to read and

easier for the hacked company to admit to. But

the reality is that no matter the size or the scope

of a breach, usually it’s caused by an action, or

failure, of someone inside the company.

The role that insiders play in the vulnerability of

all sizes of corporations is massive and growing.

In the 2016 Cyber Security Intelligence Index,

IBM found that 60% of all attacks were carried out

by insiders. Of these attacks, three-quarters

involved malicious intent, and one-quarter

involved inadvertent actors. IBM Security

research also found that health care,

manufacturing, and financial services are the top

three industries under attack, due to their

personal data, intellectual property and physical

inventory, and massive financial assets, respectively. However, while industries and sectors differ

Page 2: SECURITY & PRIVACY The Biggest Cybersecurity …ummaha.weebly.com/uploads/4/5/1/3/45136799/the_biggest...SECURITY & PRIVACY The Biggest Cybersecurity Threats Are Inside Your Company

INSIGHT CENTER

The Future of CybersecuritySPONSORED BY KPMG

Exploring the risks and the remedies.

substantially in the value and volume of their assets and in the technology infrastructures they have

to manage and defend, what all businesses have in common is people — all of whom have the

potential to be an insider threat.

Before addressing the threat, it’s helpful to understand the primary types of insider risks:

We’re only human, and at exactly the wrong time. Human error is a major factor in breaches, andtrusted but unwitting insiders are to blame. From misaddressed emails to stolen devices toconfidential data sent to insecure home systems, mistakes can be very costly. The riskiest of theseare well-meaning IT admins, whose complete access to company infrastructure can turn a smallmistake into a catastrophe.A few people leak the passwords. With these trusted but witting insiders, it’s the thought thatcounts. Malicious employees whose intent is to steal or damage are a very real risk. Some stealcompetitive information, some sell data or intelligence, and some just have a vendetta against theorganization.A wolf in the clothing of John from accounting. Cyber criminals are experts at hijacking identities.Some accomplish this by compromising an employee system through malware or phishingattacks; some leverage stolen credentials, especially by gleaning data from social networks. Inmany cases attackers can increase a hacked user’s access within a system, leading them to evenmore sensitive information.

The most dangerous aspect of insider threats is the fact that the access and activities are coming

from trusted systems, and thus will fly below the radar of many detection technologies. Particularly

in the latter two categories, malicious actors can erase evidence of their activities and presence to

further complicate forensic investigations.

Based on the success of these types of attacks,

they seem to represent a perfect crime. And in

some organizations the challenge of identifying

these rogue elements has resulted in attempts at

“zero trust” environments. But security teams

have another formidable adversary: reality. While

restrictive security policies may seem to be a valid

strategy, they impede productivity, hamper innovation, and frustrate users.

Page 3: SECURITY & PRIVACY The Biggest Cybersecurity …ummaha.weebly.com/uploads/4/5/1/3/45136799/the_biggest...SECURITY & PRIVACY The Biggest Cybersecurity Threats Are Inside Your Company

Fortunately, analytics and the rise of artificial intelligence make spotting potential insider threats

easier and less intrusive. However, even with advances in technology, managers need to be aware of

what to look for and how to focus their security efforts to get the greatest returns on protection:

Focus on the right assets. Bad guys want what you value most, what we call your businesses’“crown jewels.” Identify the most-valuable systems and data, and then give them the strongestdefenses and the most frequent monitoring.Apply deep analytics. Humans are creatures of habits: They come to work at the same time anddo familiar tasks. The same can be said for how they use and interact with technology. Deepanalytics and AI can uncover deviations in behavior at the level of individual employees, whichcan make it much easier to spot indications that systems have been compromised. We recentlyhelped a customer collect and analyze terabytes of such data, and within 15 minutes they sawviolations of policy that they didn’t know existed.Know your people. Understanding the users who hold the potential for greatest damage is critical.Addressing the security risks that these people represent, and the critical assets they access,should be a priority. In particular, monitor IT admins, top executives, key vendors, and at-riskemployees with greater vigilance.Don’t forget the basics. In security we love the newest tools. But getting the basics done well canmake the biggest impact on insiders: Applying software patches automatically closes that openwindow before a hacker can use it to access your network. Enforcing strong standards for useridentities and passwords means stealing credentials is that much harder. Collecting all the dataand forensics you can on every device that touches your network makes sure you’re the first toknow if you’ve been hacked, not the last. But forget technology altogether — user awarenessprograms are the key to educating insiders. Train your people, test them, and then try to trickthem with fake exercises. These basics make a disproportionate impact but they do require workand perseverance.

So when you read the next salacious headline about some breach by an external hacker, remember

that these attacks account for less than half of the breaches out there. And remember that the hacker

probably used the identity of an unsuspecting employee to pull it off. Take action to make sure your

organization isn’t the next one in these headlines.

Marc van Zadelhoff

Page 4: SECURITY & PRIVACY The Biggest Cybersecurity …ummaha.weebly.com/uploads/4/5/1/3/45136799/the_biggest...SECURITY & PRIVACY The Biggest Cybersecurity Threats Are Inside Your Company

Marc van Zadelhoff has nearly 20 years of experience in strategy, venture capital, business

development, and marketing, in the IT and security space. Currently, Marc is the General Manager of

IBM Security. Marc previously served as VP, Worldwide Strategy and Product Management for IBM

Security, responsible for overall product management, budget, and positioning for IBM’s entire global

security portfolio.

Related Topics: IT | TECHNOLOGY

This article is about SECURITY & PRIVACY

FOLLOW THIS TOPIC

Comments

Leave a Comment

P O S T

REPLY 0 0

1 COMMENTS

Ram K 11 days ago

Humans are the weakest link - quite often we hear that. As mentioned in the article, focus should be on getting the

fundamentals right rather than running behind the latest tools...

POSTING GUIDELINES

We hope the conversations that take place on HBR.org will be energetic, constructive, and thought-provoking. To comment, readers must sign in or

register. And to ensure the quality of the discussion, our moderating team will review all comments and may edit them for clarity, length, and relevance.

Comments that are overly promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment. All postings become the property of

Harvard Business Publishing.

JOIN THE CONVERSATION