Securing the Weakest Link: Insiders

No longer is a hoodie-wearing malicious hacker the most obvious perpetrator of an inside cyber attack.

Philip Casesa, CISSP, CSSLP, PMP, Product Development Strategist, (ISC)²

April 13, 2016

5 Min Read
Dark Reading logo in a gray background | Dark Reading

Massive, high-profile security breaches dominate today’s headlines and consumers are swamped with notifications from organizations entrusted with private and sensitive data.  But, increasingly, I am convinced that security professionals and the majority of security vendors are too focused on the wrong things.  

To many, it seems like the hoodie-wearing malicious hacker is the obvious enemy.  We imagine that he (or she) has been waiting for the perfect opportunity to launch that magical zero-day exploit s/he’s been sitting on, just waiting for the perfect moment to strike.  While this type of attack can happen, it isn’t the most common form of an attack that results in a breach; nor is it the biggest risk to your organization. 

Let’s look at what defines an “insider.” An insider is any individual who has authorized access to corporate networks, systems or data. This may include employees, contractors, business partners, auditors or other personnel with a valid reason to access these systems.  Since we are increasingly operating in a connected fashion, businesses are more susceptible to insider threats than ever before.  The volume of critical data in organizations is exploding, causing more information to be available to more staff.  While this can boost productivity, it comes with inherent risks that need to be considered and mitigated, lest that privileged access be used against the organization. 

 Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!

 Mitigating risk is all about identifying weak points in the security program. The weakest point in any security program is people; namely, the insider.  Insider threats can be malicious; but more commonly, they are accidental.  Insiders can have ill intent, they can also be manipulated or exploited, or they can simply make a mistake and email a spreadsheet full of client information to the wrong email address.  They can lose laptops or mobile devices with confidential data, or misplace backup tapes.  

These types of incidents are real and happen every day. They can lead to disastrous results on par with any major, external cyberattack.  Traditionally, these threats are overlooked by most businesses because they are more concerned with the unknown malicious actor than the known staff member or business partner.  Organizations are sometimes reluctant to take the steps necessary to mitigate these threats and share important data through a trusted relationship. They put little to no emphasis on implementing security controls for insiders.

Those of you who believe that you can count on employees as a line of defense in the organization, think again. A recent SailPoint Technologies survey found that 27 percent of U.S. office workers at large companies would sell their work password to an outsider for as little as $1001.  Many years ago, (in a 2004 BBC News article) users were willing to trade passwords for chocolate bars.  With employee engagement levels as low as 30 percent in some organizations, asking employees to be a part of the solution may be asking too much.

Given the current insider situation, attackers need not resort to elaborate attack methods to achieve their objectives.  A 2016 Balabit survey indicates that the top two attacker techniques are social engineering (e.g., phishing) and compromised accounts from weak passwords.

There are a number of ways that insiders can cause damage.  In some cases, they are coerced by an outsider to extract data.  This is common when organized crime is involved.  In other cases, legitimate user access is used to extract data, but the user’s real credentials have been compromised and don't trigger security alerts focused on malware, compliance policies and account-brute-force attacks.

The good news is that organizations can do more now than ever before.  Providers are responding with solutions that monitor email traffic, Web usage, network traffic and behavior-based pattern recognition to help detect who in the organization is trustworthy and who may be a risk.  If a staff accountant is in the process of exporting customer data at 3 a.m., this behavior is flagged as anomalous and alerts security staff to a potential compromise.  The employee that starts logging in later, leaving earlier and sending fewer emails to his manager may be disengaged or even disgruntled; and worth keeping an eye on.  

Although this is a murky area, HR can be a security advocate, identifying employees with discipline issues whom could fit a risk profile.  While this may be a little “big brother” sounding in nature, some organizations may find this to be an appropriate way to mitigate the risks that come from insiders.  Organizations without big security budgets still have some old-school mitigations available to them such as employee awareness programs, employee background and reference checks, and exit interviews to gather information about attitudes toward the company and insights into working conditions. 

The clear lesson here is that organizations must look past the perimeter and know what is happening inside the network, in addition to what is happening outside. The most likely enemy won't fit the stereotype: beware that the threat could very well come from within. 

Related Content:

About the Author

Philip Casesa

CISSP, CSSLP, PMP, Product Development Strategist, (ISC)²

Philip Casesa is one of the leading voices representing (ISC)², often commenting on high-profile cyberattacks, breaches and important cybersecurity topics. His expertise has been featured in Security Week, CIO, CSO, GovInfosecurity, Dark Reading, eSecurity Planet, Health Management Technology, Fed Scoop, Help Net Security and more.

Philip has successfully led many IT-based projects that drive critical business operations and revenue. In his current role as product development strategist for (ISC)², he is responsible for designing and developing new products, market analysis, product strategy, quality assessment and feedback programs for all products, and identifying new partnerships to enhance the company's product lines. A seasoned IT, software development and security professional, Casesa holds the CISSP, CSSLP, PMP and ITIL certifications. He holds a bachelor's degree in decision and information sciences and a MBA from the University of Florida.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights