Insider threats are a serious problem for organizations. Ninety-one percent of IT and security professionals feel their company is vulnerable to insider threats, according to a recent study from operations management specialist BetterCloud. About 75% of them feel that the biggest risk comes from cloud applications like Dropbox and Google Drive.
Several insider incidents have made headlines recently, and organizational leaders appear to be taking the risks seriously. However, another recent study, this one by the Ponemon Institute, suggests that organizations may not be fully understand what they are up against.
And that means they may remain unprepared for insider threats.
Companies continue to move their business into the cloud, powering a workforce increasingly consisting of contractors and part-time associates. That should only increase the threat of insider attacks, which means businesses, nonprofits and other organizations must take steps to improve their threat readiness.
Be Better Prepared for Insider Threats
One major issue getting in the way of insider threat prevention is how effective cybersecurity teams are in detecting stealth attackers. The Ponemon study found that only 42% of respondents have confidence that their organization is consistently able to detect malicious activities. Even fewer believe their teams are catching unusual resource usage and suspect activities.
The Ponemon study points at some general areas of improvement. Among these:
- More attention paid to incident response.
- Better cybersecurity awareness at leadership levels
- Strategies or tools to prevent attackers from discovering credentials and making lateral moves.
Insider threats are a substantial risk area, and organizations need to develop and document a multi-faceted plan of action to address it. Leadership needs to be educated on insider risks, and they need to communicate these risks effectively to stakeholders. Employees must be trained to understand their responsibilities in managing risk and identifying what actions violate security policies. IT security teams need tools that can help them correlate actions across systems to improve insider threat intelligence.
Lunarline is prepared to help your organization construct a plan that covers all the bases. For more information on how we can help, contact us online today.