What’s Worse, an Insider or Outsider Threat?

Hacker sitting at laptop

When IT pros think of hackers, images of young men sitting around a smoky room in Eastern Europe staring at monitors may come to mind. And yes, many hacks, especially large scale incursions, do come from organized groups of outsiders and often foreign entities. This outside threat is why firewalls, and intrusion detection and prevention systems are so common.

But these perimeter defenses do little to fend off what may be the biggest threat – an attack from inside!

Insiders not only have network access, sometimes at a high level, they also know much of what is on the network, and where exactly that data resides.

There is nothing murky about the degree to which insiders are a problem. Verizon defines the problem with a fair amount of precision in its annual data breach report. The annual Verizon Data Breach Investigations Report documents the extent of the current threat.

The first issue is defining what an insider is, and which of them do the most damage. Verizon found that “almost one third were found to be end users who have access to sensitive data as a requirement to do their jobs. Only a small percentage (14%) are in leadership roles (executive or other management), or in roles with elevated access privilege jobs such as system administrators or developers (14%),” the report stated. “The moral of this story is to worry less about job titles and more about the level of access that every Joe or Jane has (and your ability to monitor them). At the end of the day, keep up a healthy level of suspicion toward all employees. While we would like to think they will never give you up, let you down, run around or desert you, we simply can’t (tell a lie, and hurt you).”

This isn’t just fun and games for the perpetrators. Greed is usually the driver. “What motivates them? Most frequently it is the potential for financial gain (34%), although the espionage motivation (25%) continues to be associated with these breaches,” Verizon found.

Privilege Abuse

Outsiders need to jump through hoops to gain user privileges to access the victim’s data. Insider already have privileges. That’s why privilege abuse is such a common breach method. “When the nature of their (the hackers’) actions is known, the general privilege abuse is always at the top of the list. This is merely using access to gain information for alternative and unsanctioned uses,” Verizon discovered.

The next step involves the data itself. “Data mishandling follows and typically involves mailing sensitive information or loading to a sharing service. Many times this is not done with malicious intent, but for a convenience factor,” Verizon found.

Breaches and data misuse isn’t always malicious, at least in intent. “Use of unapproved hardware and software are the third and fourth most common varieties of misuse. The unapproved hardware is usually either a USB drive (used to store information to be used later, like, when employed at another company kind of later) or a hand-held skimmer that we have seen food servers use to capture diners’ payment card data,” the report explained.

Insiders don’t even have to hack your systems to cause problems. They can just misuse them. Here are some of the problems they can cause:

  • Crime such as fraud and theft
  • Data theft and leakage
  • Sexual harassment and sometimes even child pornography and victimization
  • Corporate Espionage
  • Data corruption/deletion
  • Insider trading

Working Towards and Answer

The first step in combating the threat from inside is knowing there is a problem. Then take a deeper fuller approach to security. Here you need to know what is going on in the network and who is doing what.

“You cannot effectively protect your data if you do not know where it resides. Likewise, it does you little good to know where it is but then pay no attention to who has access to it. Make sure that you are aware of exactly where your data is and be careful who you give privileges to and to what degree. It makes sense to give the valet attendant your keys to park your car, but not to hand over your credit cards as well,” the report said.

The Secret to Security – Layers

Protecting your network these days’ means having multiple layers of protection. Learn more with our white paper Protect Your Company’s Data and Infrastructure with Layered Security.

Posted by Doug Barney
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.
Patch Management Super Highway

2019 IT Operations Survey Results: Automated Patch Management Not Widely Adopted

Patch management and vulnerability management play a critical role in endpoint security. The process includes discovering assets in the network,Read More

Data Breach

2019 IT Operations Survey Results: Security Breaches and Outages Show No Sign of Slowing Down

The 2019 Kaseya IT Operations Survey has brought to light a few surprising as well as some obvious results about ITRead More

Art of business man riding a rising arrow with a telescope in hand

5 Steps to a Successful Mid-year Goal Check-in

The day-to-day demands of running an MSP can keep everyone quite busy, whether they’re putting out fires or upgrading aRead More

Art of people working on a UI design

3 Key Takeaways From the 2019 State of IT Operations Survey

Kaseya conducted its fifth annual IT Operations Survey this past June, aiming to delve into current IT operational state andRead More

Connect IT Asia-Pacific - Don't Miss the Premier IT Management Event of the Year - Join Us in Sydney 1-3 October 2019 - Register Now