Insider threats are like tumors in a person’s body. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before they form.
The following steps outline how best to defend your business from such threats.
- Identify indicators that reveal insider attacks at work
Review and assess red flags that demonstrate characteristics of external attacks, such as accessing sensitive information that is not related to job duties or downloading large volumes of data to external hard drives.
- Think outside the box
Check for external attacks masquerading as insiders. Criminal hackers can pose as system administrators using standard network and IT administration tools to move within the network and steal data.
Set up a system that enables employees to report potential threats. Reports should be done anonymously to reduce the rate of false positives. Employees will be more responsible in reporting insider threats as they are accountable for the information they turn in.
- Implement and insider threat program
Develop and insider threat program that will detect, mitigate and manage insider threats. Collaborate with stakeholders and related departments such as Human Resource and finance.
- Control the environment
Ideally, BYOD (Bring Your Own Device) should not be implemented. They can enable insider threats to breach security and slip undetected because they already have access to your network using their device. Employees need to comply with monitoring and strict controls.
- Monitor Data at risk
Check employees who are proposed for dismissal to see what kind of data they have access to and how this data is moved around.
- Maintain Information governance
Protect critical data assets through a sound information management process that includes identifying what information you have, where you have it, how it is protected, how it is shared, who has access to, how long it is stored and when it should be disposed.
- Apply advanced data analytics techniques
Use forensic data analytics tools to objectively analyze tools to objectively analyze behaviors, identify and rank risks, and detect insider threats.
This guest post was first published HERE and submitted by Vlad de Ramos. Vlad has been in the IT industry for more than 22 years with focus on IT Management, Infrastructure Design, and IT Security. He is also a professional business and life coach, a teacher and a change manager. He has been focused on IT security awareness in the Philippines. He is a certified information security professional, a certified ethical hacker and forensics investigator and a certified information systems auditor. Visit his website www.aim.ph