Whether insiders or outsiders pose a greater threat to security is a matter of ongoing debate. According to Verizon’s 2018 Data Breach Investigations Report, 73% of cyberattacks were executed by outsiders and 28% of attacks involved insiders.
While it’s informative to look at the issue from a statistical perspective, numbers don’t tell the entire story. When asked, most cybersecurity experts will say that the insider threat is more serious because it’s harder to detect. If a user has legitimate access to a company’s files, it’s not easy to see if they may be using that access for illegitimate purposes.
Outsider risks are only slightly less serious. Because data is so valuable, a lot of money and resources are applied to hacking efforts worldwide. According to the 2018 report mentioned above, half of all breaches were the work of members of organized criminal groups, and nation-state or state-affiliated actors were involved in 12% of those.
Here are some of the risk factors experts are most concerned about today. Note that many of these take advantage of new and emerging technologies, including blockchain, AI, and IoT devices.
Outside threat factors can seem overwhelming because of the sheer volume and scope. But you can do a lot to keep your data safe if you are vigilant, thorough, and security-oriented. If you focus on the 3 areas listed below, you will be well on your way to a strong security posture:
An insider threat can take many shapes:
Internal security threats can be broken down into 5 distinct categories, according to an article published by SecurityIntelligence:
Nonresponders: Staff members who are immune to security training. While these insiders don’t have bad intentions, their patterns of behavior can lead to security breaches. Studies show that people who have fallen prey to phishing campaigns in the past are more likely to get phished again.
Inadvertent actors: These insiders generally display good security behaviors and are compliant with policy, but they unintentionally cause breaches due to accidents, misjudgments, misconfiguration, and forgetfulness.
Hackers focus on the two categories above because they are an exploitable vulnerability.
Insider collusion: An example of insider collusion is two engineers who steal product plans and then quit to launch their own competitor enterprise. Additionally, cybercriminals have been known to recruit employees to steal information.
Persistent malicious insiders: Also known as ‘second streamers,’ these actors are looking for additional income and exfiltrate data in a slow and measured way to avoid detection.
Disgruntled employees: The last category of insider is an upset or unhappy employee who commits intellectual property theft or deliberate sabotage.
The best way to protect your data from insider threats is to practice good security management.
We recommend following these best practices:
The best way to really understand your level of risk exposure is to do a security audit. Companies with security concerns often seek support in the form of partnerships.
Security service providers can help with security, threat assessment, solution design, and monitoring. They work as consultants, extensions of your own IT department, and shore up areas such as security using the latest in technology and high-level expertise.
Put some distance between your organization and the risks of data security.
Learn more about Solutions II Data Security Services.