Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Rogue employees the biggest fear, but only half train staff

by The Gurus
May 8, 2014
in Editor's News
Share on FacebookShare on Twitter

Rogue employees are the biggest threat to information security, although there is little investment in training or compliance.
 
Based on a poll of 79 attendees at last week’s Infosecurity Europe 2014 by the BSI, 37 per cent of those respondents said the biggest threat was rogue employees, higher than cyber attacks (19 per cent) and bring your own device (15 per cent).
 
Suzanne Fribbins, risk management expert at BSI, said that it was no surprise to see insider threats as the biggest risk to information security, as employees will always be the one thing that cannot be controlled. “Employees don’t necessarily have to be malicious to put a company at risk; they may just not understand the possible risks associated with their actions.”
 
Speaking to IT Security Guru, Tom Cross, director of security research at Lancope, said it is important to differentiate the different classes of insider threat; as some insider threats come as a consequence of employee negligence. “Such as someone leaving a laptop with sensitive information on an airplane, or someone setting up a development website on the internet with real customer data,” he said.
 
“These are by far the most common causes of sensitive data loss by organisations. In other cases, malicious employees intentionally steal information. Of course, employee credentials or computer systems are sometimes compromised by external attackers. Each of these three categories of insider threat: negligent insiders; malicious insiders; and compromised insiders, require distinct responses within an information security program.”
 
The recent Verizon data breach investigations report found that the use of stolen and/or misused credentials (user name/passwords) was the main way to gain access to information, with two out of three breaches exploiting weak or stolen passwords.
 
The survey also found that 52 per cent of respondents had implemented an internal information security policy, while 47 per cent had provided staff training. Asked if he expected that training would be adopted by the large majority of respondents, Cross said that employee training can have a huge impact on all kinds of insider security threats, and is training is the most effective means to combat employee negligence that results in data loss.
 
“However, it also helps if the organisation puts thought into how to ‘keep honest people honest’ by ensuring that good information handling practices are the also the path of least resistance for getting work done in the organisation,” he said.
 
“Training can also have an impact on certain compromise vectors like spear phishing. Although some employees will not respond to training, others will, and often a sharp eyed employee can be your first indicator that a sophisticated attacker is attempting to use spear phishing to compromise your organisation.”
 
Also, the survey found that 29 per cent of respondents are either certified or operating in compliance (34 per cent) with ISO 27001, while a further 23 per cent indicated they were looking to certify in the immediate future.
 
Cross said: “Compliance frameworks like ISO 27001 can help you organise your information security program and explain the actions you are taking to management as being consistent with best practices. However, robotic compliance with standards should not be the driver of your information security efforts, as inevitably a minimal effort to meet standards complia
nce will leave important gaps in your defences. You should focus on protecting the organisation first by addressing the most important attack vectors, and then align those efforts to standards as a secondary step.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Ransomware hits Android mobiles

Next Post

300k servers vulnerable to Heartbleed one month later

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information