If the boundaries are ever-changing, what does that mean when it comes to the endpoint and user behaviour?
According to Haystax Technology, in 2017, 90% of organisations reported feeling vulnerable to insider attacks -- up from 64% in 2015. This looked set to rise to 99% in 2018, thanks partly to the rise in risk from regular employees too. These stats tell us that a cyber strategy focused on protecting the perimeter is now futile -- employees have become the perimeter and they're always on the move, morphing said perimeter by logging onto the network from different devices and locations.
Indeed, as 2018 reaches its final quarter, these predictions seem increasingly accurate. After all, when contemplating the various headline-grabbing cyber incidents from the past few months -- of which there’s certainly been no shortage -- the truly jaw-dropping ones have tended to involve employees, with motivations ranging from ideology, revenge, and cold hard cash.
2018 saw Apple crowned as the first trillion-dollar company, closely followed by Amazon -- but that’s not all these technology giants shared in common. In July, news broke that Apple suffered an insider attack after a former employee stole data relating to its autonomous driving project before attempting to flee to China and eventually being arrested by the FBI. September saw Amazon staff caught selling customer data to third-parties in the US and China.
Evidently, trillion-dollar valuations mean not only a lot of customer data, but also a large organisation to hide illicit activity within. Both of Apple and Amazon’s insider threats came after Tesla’s, whereby a past employee tampered with Tesla’s code for autonomous driving software and exported highly sensitive data to unknown third-parties. It transpired that the prime motivation behind the incident was an act of vengeance after being denied a promotion.
Of course, insider threats abound in businesses of all sizes, not just technology behemoths. Earlier this year, a report from Cybersecurity Insiders revealed that two-thirds of US companies now believe that insider threats are more likely than external attacks. This is because, thanks to the ubiquity of shadow IT -- a term which describes the use of IT systems within an organisation without the approval, or even the knowledge, of the IT team -- employees at all levels can now access huge swathes of sensitive and business critical data.
But why is this happening? Without a doubt, organisations of all shapes and sizes have never been more vulnerable to attack, thanks to a dramatic increase in entry points. In addition to the countless connected devices that employees carry around every day -- to and from work -- the Internet of Things (IoT) is swiftly expanding the scope for an attack. Consequently, the modern business has no perimeter -- or, rather, its staff serve as the perimeter. This happens because companies all over the world still haven’t got appropriate protection in place that flags insider threats before they cause serious damage.
Of course, despite the recent headlines, insider threats are not always malicious and purposeful. The term might conjure cloak and dagger espionage, but 'insider threats' covers myriad internal vulnerabilities. These can range from accidental errors and compromised credentials stemming from a socially-engineered data breach, courtesy of a lack of basic cyber security hygiene, all the way through to malevolent insiders. In fact, an McAfee report found that nearly half of the data breaches studied were caused by employees, contractors, or suppliers.
For contemporary organisations, with the boundaries ever-changing, as Cyber Defence Mag discuss, this must lead to an overhauled approach to endpoint security and user behaviour analytics. Traditionally, cyber security companies strived to prevent outside attackers from penetrating a company’s network, in line with the mantra of the past that prevention is better than cure. Now, however, it’s not a case of if an organisation will get breached but when. As such, cyber security firms are now focusing their attention inwards, rather than towards a company’s boundary -- representing a seismic shift in the way IT departments and the C-suite alike approach the integrity of their organisations.
For IT leaders, the temptation can be to double down on strict security policies, introducing increasingly obtrusive measures in a bid to combat cyber crime. However, there’s no use implementing processes that ultimately make it harder for employees to work efficiently. Undoubtedly, the business will suffer as a result, thanks to stifled innovation and experimentation. Instead, rather than seeking to completely eliminate breaches, it’s just as important to rapidly identify breaches and stop them turning into full-blown disasters.
This is where the power of user and entity behaviour analytics (UEBA) and machine-learning becomes most apparent. These technologies rapidly get to know a business and identify security risks from the inside, so that they can spot suspicious behaviour such as unusual out-of-hours access -- think files transferred to atypical locations, from anomalous countries. Should anything suspicious arise – for example, an intern accessing the CFO’s files at 3am from an IP outside the office -- the company in question will be alerted to the relevant risky or noncompliant behavior.
Still, technology alone is never enough. Cyber crime used to be an elite activity, carried out only by those with the appropriate coding skills, often targeting stationary endpoints. These days, with everyone carrying mini-computers in their pockets, anyone can hire a hacker or try to sell company data from the inside. Consequently, when humans are the perimeter, -- human security teams empowered by machine-learning technology prove to be a formidable threat hunting force.
To this end, a robust company-wide education programme that encourages an open culture of security is vital for keeping data secure. As well as regular and interactive staff training, even retro approaches such as posters stuck onto office walls can help. Above all, the blame culture of IT security needs to change, so that insider threats can be spotted and managed before they cause extensive damage. Organisations that don’t silo security -- instead fostering a collaborative approach between IT, the C-suite, and all other employees, educating and making everyone accountable -- will reap the most rewards and stand the best chance of safeguarding themselves in this perimeterless world.
Explore how to identify, monitor and respond to potential Insider Threat attacks in our '2018 Rise of the Insider' Report. If you'd like to uncover more about the ZoneFox solution, book in for a product demo with our security experts and discover how complete Insider Threat protection can enhance your enterprise cybersecurity posture.