If you were asked what every company or organization has in common; what would you say? Well, there are many potential answers, but one thing is for certain — all companies/organizations are at risk for insider threats in cyber security. There is a lot of attention in the media about companies being hacked by external parties (e.g. individuals, criminal organizations, or nation-states), but the greater risk to organizations comes from those already within the “walls of the castle.
On the surface, defining insider threat seems self-explanatory–a source of potential danger or harm to an organization stemming from someone that is within or part of an organization. There are, however, varied sources and motivations of insider threat.
In an April 2018 report, the Ponemon Institute issued an insider threat report and provided interesting insider threat statistics regarding the costs of insider threats to organizations around the globe across 13 different industries. For the purposes of the report, insider threats were comprised of the following:
There are, of course, more fine-grained categorizations of insider threats, but the Ponemon report kept it simple.
As part of the Ponemon report, 717 security practitioners working in 159 organizations across the world were interviewed regarding the impact of insider threats on their organization. Each of the 159 organizations had at least one material event caused by an insider, but there was a total of 3,269 insider incidents evaluated as part of the report. Of the 3,269 insider incidents evaluated, 64% were related to negligence; 23% resulted from a criminal or malicious insider, and 13% resulted from credential theft.
Examples of insider threats are wide and varied, but some of the more prevalent examples are outlined below:
A good place to start when determining how to mitigate the risks of insider threats is to do an insider threat risk assessment. As part of the risk assessment, focus on the behaviors that indicate an insider attack. Once these behaviors are identified, then develop controls to support insider threat detection and prevention. Below are several suggestions regarding controls for detection and prevention:
© J S Teksys Inc. 2019. All rights reserved.