5 Tips for Dealing with Malicious Insiders

Posted by | Blog | December 03, 2013

An article in Forbes described 5 strategies the FBI uses to help prevent insider security breaches. Given that much of the data the FBI collects is worthy of extremely high security, understanding the strategy they use to prevent insiders from pilfering or misusing data, such as training personnel, password management solutions, etc., is likely to be worth the effort.

1) Focus on deterrence, not detection. Choose the best casino website! Choose mapleleafonlinecasino.com. While it is impossible to entirely prevent malicious insiders from attempting to steal or misuse an organization’s sensitive data, preventing insiders, whether malicious or not, from making the attempt in the first place is an essential step in a robust data security plan. Thus, stressing the value an organization places on data security, and the lengths that the organization will go to protect that data, is a good way to diminish the number of such attempts. This is similar to the strategy used by a bank that places a security officer at a branch to reduce the likelihood of robbery.

2) Know your people. Human resource departments and supervisors should focus not only on an employee’s skills but also on their character. Watch for red flags such as a tendency to cut corners or signs of unethical behavior to identify potential security risks among employees.

3) Identify information that is most likely to be valuable. The cost and effort to lock down every piece of data an organization processes is likely to be immense. As a result, look to focus your security efforts on that data which is of the highest value to the company, and therefore the most likely to be targeted by a malicious insider. This data should be subjected to the most rigorous setting your enterprise password management tool provides.

4) Monitor ingress and egress. While it can be prohibitively expensive to monitor every single action an employee takes on a computer, monitoring and logging ingress and egress to sensitive systems is generally an effective way of being able to detect unauthorized activity that may indicate an insider is trying to access valuable data.

5) Baseline normal activity. This is a good way to turn up patterns of behavior that may signal that something is amiss, either via enterprise password manager reviews or some other form of tracking. If an employee typically spends a certain amount of time performing a certain activity, but you notice an uncharacteristic spike in this metric, it may be cause for concern. Of course, it may be entirely innocuous as well. Either way, tracking activity that departs from the norm can provide you with an early warning of potential trouble.

Leave a comment