SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers
Story image

Insider threats highlighted, calls for enhanced security measures

Mon, 16th Sep 2024

Security experts have highlighted the ongoing threat posed by insiders to organisations in various sectors, coinciding with National Insider Threat Awareness Month. Insights from professionals at Protegrity, Securin, Traceable AI, Zerto, Datadobi, and Foxit underscore the complexities of insider threats and the evolving risk introduced by advanced technologies such as Generative AI.

Clyde Williamson of Protegrity pointed out, "Insider threats can be intentional with malicious purpose through the abuse of authorised employee credentials, or they can be unintentional threats with access to sensitive data that, in threat actor hands, can cause harm." He emphasised the limitations of existing security systems, which often function as a mere "protective moat around the data, still vulnerable to human error or influence internally." Williamson advocated for stricter data security measures, such as encryption and tokenisation, to limit the impact of insider threats.

Kiran Chinnagangannagari from Securin identified humans as the "most neglected and overlooked threat" in cybersecurity strategies. He noted the increasing risks posed by sophisticated AI-powered social engineering attacks that mimic human communication patterns. "Cybersecurity professionals must fundamentally rethink how we approach user education and authentication," Chinnagangannagari remarked. He recommended using network behaviour analysis, multi-factor authentication, and clear security policies to mitigate the risks associated with insider threats.

Katie Paxton-Fear of Traceable AI highlighted the significant human element in insider threats. She suggested establishing comprehensive offboarding procedures, providing employee assistance programs, and implementing performance review processes to reduce the likelihood of insider threats. "Ultimately all three of these factors are built on fostering a secure and supportive work environment," Paxton-Fear stated, emphasising the importance of a supportive workplace in mitigating insider risks.

Kevin Cole from Zerto indicated that human error is responsible for nearly half of all instances of data becoming unrecoverable. "Whether it is an employee who sells data for personal gain, sabotages systems before leaving, falls victim to a phishing attack, or just makes an innocent mistake, insider threats can blindside an organisation and cause severe damage," Cole warned. He advised companies to invest in data protection solutions that prevent unauthorised access and facilitate prompt recovery following breaches.

DeeDee Kato of Foxit focused on the importance of robust document security, particularly for PDFs that often contain highly sensitive information. She advised choosing PDF solutions with encryption, digital signatures, redaction tools, and advanced permission settings to control access and modifications. "Audit trails and tracking capabilities are two more features that will take your data protection and security to the next level," Kato added, reinforcing the necessity of comprehensive document security.

Carl D'Halluin from Datadobi emphasised the significant financial and operational impact of insider threats. "In 2023, the average annual cost of an insider risk rose to USD $16.2 million per organisation," he noted, citing the Ponemon Institute's report. D'Halluin highlighted the vulnerability of unstructured data, which constitutes 80% of data and often contains valuable information. He urged organisations to invest in solutions that provide visibility and control over unstructured data and to foster a culture of accountability to minimise human error.

The expert testimonies collectively stress the importance of re-evaluating current security measures and adopting comprehensive strategies to address insider threats effectively. The emphasis on human factors and advanced technological safeguards is deemed crucial in navigating the evolving landscape of cybersecurity risks.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X