What is an Insider Threat?
An insider threat is an organizational threat, malicious or negligent, that comes from anyone who has authorized access to internal data or computer systems. These threats are often malicious but can also arise out of negligence. Insider threats can be employees, contractors or third party vendors that take or exfiltrate data.
The Usual Suspects
- Malicious insiders. Employees or anyone granted internal access who abuses their authority with the intent of causing damage to an organization is a malicious insider threat. For example, a former Google engineer took self-driving-car technology from the company shortly before he joined Uber's efforts to catch up in the high-stakes race to build robotic vehicles.
- Negligent insiders. People who don’t have malicious intent but put their organizations at risk through inadvertent errors or simply disregarding IT policies are negligent insiders. An example of a negligent insider includes a data analyst working for the Department of Veterans Affairs who downloaded the personal data of 26.5 million US military veterans to their laptop. The analyst’s home was burglarized and the laptop was stolen.
Common insider threats
Departing employees account for more than half of all insider threat incidents. Two thirds professionals openly admit to taking data with them when they leave an organization.
Mergers & Acquisitions participants
Rumors of Mergers & Acquisitions commonly lead employees to begin preparing for the worst, pulling together files and data to help them land a new job. This also opens up and organization to risk through third party vendors used during the M&A process.
Non-voluntary employee changes and departures have an even higher risk of data loss, leak, theft, or worse—destruction or deletion.
High level access
Anyone that has access to source code, customer lists, internal strategy and planning documents or any other data that could cause damage if leaked to outside parties.
Personal cloud usage
It is all too common that employees are using their personal cloud accounts to transfer and store sensitive company data.
Unsecured physical drives
Unencrypted USB and external hard drives are often used to transport information while traveling.
Needlessly carrying sensitive information
Many employees store far more data locally than they need for their day to day job and expose it to theft.
Leaving devices unattended
It can take hackers as little as 7 seconds to gain access to that laptop you left at your table while you went to the bathroom.
2020 Data Exposure Report
36% of workers believe that the increased emphasis on file-sharing has made them more complacent about data security. Learn why insider threat programs have failed to keep pace with today's collaborative work cultures.
Why are insider threats on the rise?
Data portability. Personal cloud, removable media, bluetooth, airdrop, the list goes on but the reality is that data is more portable than ever. Many organizations attempt to prevent data loss or leaks through blocking. The reality is that there are simply too many vectors to cover, not enough people to cover them, and as a result data still gets out.
How do you stop insider threats from taking data?
Develop an insider threat program. Every organization needs to have a comprehensive insider threat program that outlines what happens when a threat is identified. Many organizations rely on technology alone to solve the problem and fail to implement a program. Any tool or technology is only as good as how it is implemented and used.
10 STEPS TO BUILDING AN INSIDER THREAT PROGRAM
- Get executive buy-in: Don’t fight this battle on your own. Getting definitive buy-in from leadership is the first and most critical step in defining your security and IT team.
- Identify and engage your stakeholders: Identify and engage line-of-business leaders such as, HR, legal and other IT leaders as key stakeholders.
- Know what data is most valuable: All data has value, but it’s essential to understand the different types of unstructured data to keep a close eye on.
- Think like an insider: Why would they want to move or take information — and what would they ultimately want to do with it? What tactics or blind spots might they exploit to do it? What workarounds could they use to get work done?
- Define insider triggers: Start by focusing on the most common data exfiltration scenarios. Departing employees and high-risk workers are a great place to start.
- Establish consistent workflows: Exceptions and workarounds are the Achilles heel of insider threat programs. Make sure you clearly define the workflow for each trigger — and consistently execute and improve the steps you establish.
- Create rules of engagement: It’s important to define what happens once a workflow has been triggered and potential data exfiltration identified. Your rules of engagement separate security and IT from any enforcement responsibilities. This allows them to focus on monitoring, detection and remediation.
- Leverage existing security and IT teams — and train your stakeholders: Because you’ve honed your insider threat program down to a few key workflows, your existing security and IT teams should be able to handle the monitoring and detection responsibilities. But security and IT teams don’t have to shoulder the full burden. It’s also critical that all stakeholders (the HR, legal, line-of-business managers, etc.) be trained so they understand the full scope of the insider threat program.
- Be transparent in communication: Transparency is critical for building a healthy culture that values security. Employees should understand that your program is applied universally and without privileges or exceptions — and they should understand how the program is designed to support their productivity while protecting the business.
- Implement true monitoring, detection and response technology: True monitoring, detection and response technology must be continuously running, providing historical context and complete visibility into all data activity. This enables your insider threat team to quickly and effectively see the full picture — and protect all data at all times.
Get the Insider Threat Toolkit
There are several key components to every great insider threat program. We’ve packaged together four resources to help you get started.
Implement an insider threat solution
Continuously monitor file activity to detect risk
Track creation, modification and movement of files
Easily identify suspicious behavior
Set up alerts for file activity based on user, data exfiltration vector and file count or size
Quickly investigate insider threats
Respond immediately by searching comprehensive file details including file hash, owner, path, size, and category alongside device information such as hostname and IP address
Access and recover files in seconds
Quickly access file contents to determine their sensitivity and value
Schedule a demo
Speed your detection and response times to insider threats with Code42 Insider Threat Protection.
By completing and submitting this form, you confirm that you agree to the storing and processing of your personal data by Code42 as described in our Privacy Statement.