Source |
ProofPoint |
Identifiant |
8422882 |
Date de publication |
2023-12-14 09:44:32 (vue: 2023-12-14 23:07:37) |
Titre |
Atténuation des menaces d'initié: 5 meilleures pratiques pour réduire le risque Insider Threat Mitigation: 5 Best Practices to Reduce Risk |
Texte |
(This is an updated version of a blog that was originally published on 1/28/21.)
Most security teams focus on detecting and preventing external threats. But not all threats come from the outside.
The shift to hybrid work, accelerated cloud adoption and high rates of employee turnover have created a perfect storm for data loss and insider threats over the past several years. Today, insider threats rank amongst the top concerns for security leaders-30% of chief information security officers report that insider threats are their biggest cybersecurity threat over the next 12 months.
It\'s easy to understand why. Insider threats have increased 44% since 2020 due to current market dynamics-and security teams are struggling to keep pace. According to the Verizon 2023 Data Breach Investigations Report, 74% of all breaches involve the human element. In short, data doesn\'t lose itself. People lose it.
When the cybersecurity risk to your company\'s vital systems and data comes from the inside, finding ways to mitigate it can be daunting. Unlike with tools that combat external threats, security controls for data loss and insider threats can impact users\' daily jobs. However, with the right approach and insider threat management tools, that doesn\'t have to be the case.
In this blog post, we\'ll share best practices for insider threat mitigation to help your business reduce risk and overcome common challenges you might face along the way.
What is an insider threat?
But first, let\'s define what we mean by an insider threat. In the cybersecurity world, the term “insider” describes anyone with authorized access to a company\'s network, systems or data. In other words, it is someone in a position of trust. Current employees, business partners and third-party contractors can all be defined as insiders.
As part of their day-to-day jobs, insiders have access to valuable data and systems like:
Computers and networks
Intellectual property (IP)
Personal data
Company strategy
Financial information
Customer and partner lists
All insiders pose a risk given their position of trust-but not all insiders are threats.
An insider threat occurs when someone with authorized access to critical data or systems misuses that access-either on purpose or by making a mistake. The fallout from an insider threat can be dire for a business, including IP loss, legal liability, financial consequences and reputational damage.
The challenge for security firms is to determine which insiders are threats, and what type of threats they are, so they know how to respond. There are three insider threat types:
Careless. This type of risky insider is best described as a user with good intentions who makes bad decisions that can lead to data loss. The 2022 Cost of Insider Threats Global Report from Ponemon Institute notes that careless users account for more than half (56%) of all insider-led incidents.
Malicious. Some employees-or third parties, like contractors or business partners-are motivated by personal gain. Or they might be intent on harming the business. In either case, these risky users might want to exfiltrate trade secrets or take IP when they leave the company. Industrial espionage and sabotage are examples of malicious insider activity. Ponemon research shows malicious insiders account for 26% of insiders.
Compromised. Sometimes, external threat actors steal user login information or other credentials. They then use those credentials to access applications and systems. Ponemon reports that compromised users account for 18% of insiders.
Insider threat mitigation best practices
Companies can minimize brand and financial damage by detecting and stopping insider threats. How each security team approaches insider threats will vary depending on the industry, maturity and business culture. However, every organization can use the five best practices we\'ve outlined below to improve their insider threat prevention.
1. Identify your risky users
Most insiders fall into the “care |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
1/28/21 2020 2022 2023 about abuse accelerated access according account across actively activities activity actors administrators adoption after agent alerts all along also amongst amounts another any anyone api applications approach approaches arduous are articulated as: asset atmosphere attacked attribute augment authorized avenue average aware awareness bad balanced based before behavior behavior below benefits best better biggest bite block blog book both bottlenecks brand breach breaches bring build burden business businesses but can capabilities capture captures careless case category centralized centric challenge challenges channels chief clearly cloud collaboration collect combat come comes common communicate communication companies company compliance compromised computers concepts concerns consequences consistent consuming content context contextualized context contractors controls converged correlate cost created credentials critical cross crucial culture cumbersome current customer cybersecurity daily damage data data daunting day deal decisions deeper define defined delivering departing depending deployments described describes detailed detect detecting determine determining develop developing different dire disparate dlp doesn don driven due during duties dynamics each easier easy educate effective efficiency efficiently efforts either element email employee employees employees enable enables end: endpoint engineering espionage every everyday evidence examples executive exfiltrate exfiltrating exfiltration experiencing exportable external face fail fall fallout fast features financial find finding firms first fit five flexibility focus follow forensics forget foster from functional gain gaps geographically get getting given global goals good grasp groups guidelines half harming have help helpful helping helps help high hires holistic how however human hybrid identify impact implications important improve incident incidents include includes including increased industrial industry information information inside insider insiders insights instances institute integrate intellectual intend intent intentions intervals investigate investigating investigation investigations involve involved irrefutable itm itself jobs keep key know knowledge later latest lead leaders learn learned least leave led legal let liability lightweight like like: likely lists lives login lose loss low make makes making malicious manage management market matters maturity may mean means measures meeting meets metadata might minimize minimizing mistake misuse misuses mitigate mitigating mitigation mitigation: monitoring months more more most motivated motivation move native need needed needs network networks new news next non not notes number occurs officers often often organization originally other out outlined outside over overcome own pace pack part parties partner partners partners party past path pdf people people™ perfect perform performance personal phishing picture piece plan plans platform policies ponemon pose position positive post potential practices practices precious prevent preventing prevention prevention print privacy privileged proactive proactively procedures process processes productivity program programs promoting proofpoint proofpoint sigma property protection provide provides providing: published purpose quickly rank rapid rates reach ready real reduce regardless regular reinforce reiterate remaining report reports reps reputational require research resistance resources respond response right risk risky roughly running sabotage safeguard save scalable scams screen secrets secure security see sensitive service several share sharing shift short should shows since single sized social solution some someone sometimes sources started starter starts steal step stopping stored storm strategy struggling successful such support sync systems take team teams technical term than that them then these they third those threat threats three tightly time timeline today together too t |
Tags |
Data Breach
Tool
Threat
Industrial
Cloud
Technical
|
Stories |
|
Move |
|