The Enemy Within: Insiders are still the weakest link in your data security chain
workstation when they
leave their desk or keeping
their passwords secret.
5 ways to foster a data
security environment
··
Educate employees to be
your first line of defence
··
Conduct random security
tests to keep employees
on their toes
··
Collaborate with
associates and form a
cybersecurity alliance
Employees can be viewed
as potential points
of failure or potential
security checkpoints. With
proper training and clear
communication of data
use policy, employees
can become the first
line of defense against
cybercrime
2 . C O NDU C T
R A ND O M SEC UR I T Y
T E S T S T O K EEP
EMP L OY EE S O N
T HEIR T O E S
According to Forrester
(2014), 42% of external
·· Build a security fortress
attacks involved some
and protect it with a
type of user interaction
persistent watchdog
(watering hole attack,
·· Form an actionable crisis
phishing, malicious link,
plan
or email attachment).
The best way to ensure
that employee training
is effective is to conduct frequent security tests (Lindros and
Tittel 2014). Gamify security audits by keeping a leaderboard to
maintain employee engagement. Examples of such tests include:
··
··
··
Spot quizzes: Administer random quizzes several times
per year and vary the questions so employees don’t
become familiar with a pattern or share their responses.
Scores should be public to foster a competitive environment.
Employees who perform poorly should receive further
training and receive more frequent testing until they achieve
a higher standard.
Workspace checks: Employees can become complacent
with information that they handle routinely. Check employee
desks for documents or notes that contain confidential
information. Check that devices in the area are locked
if left unattended and check the area around devices for
password reminders or encryption keys on post-it notes, etc.
Honey traps: Leave USB keys lying around public areas or
post USB keys from false “marketers”to random employees.
Place some code on the keys that will alert you when it is
plugged in and allow you to identify the employee
··
Social experiments: Hire a temporary employee or an actor
to pose as a new staff member. Ask them to call on random
employees, requesting confidential information such as
login credentials or information in a non-public document.
The employee/actor should have a credible story prepared
about why he or she needs the information.
··
Simulated email attacks: Phishing emails are disguised
to come from a legitimate source but they contain links to
malicious websites or attachments. These emails often fool
typical users. Teach employees how to identify a suspicious
URL before they click on it. Send phishing emails to random
inboxes and monitor who clicks on them. The links can
redirect to a webpage that informs the employee about the
security test.
This type of regular testing is important to keep data security
top-of-mind with employees. If these procedures are too onerous
for your team to manage, there are third party consultants that
can manage security testing on your behalf.
“42% of internal
security incidents were
due to inadvertent
misuse or an accident.”
3 . C O L L A B O R AT E W I T H A S S O CI AT E S A ND F O R M A
CY B ER SEC UR I T Y A L L I A N CE
Employees are not the only company stakeholders that cause
data security concerns. According to Forrester (2014), third
parties and contractors have widened the attack surface.
Cybercrime is becoming more advanced and criminals have
moved on from targeting individual organizations to targeting
entire networks of organizations. Trusted business partners
can access systems without setting off any alarms - recent
breaches at Home Depot and Dairy Queen were traced back to
compromises at third party suppliers (Vinton 2014).
By forming cybersecurity alliances with your business partners
and even with competitor companies, you can ensure that
you have all of your bases covered, making it more difficult for
cybercriminals to gain entry. By sharing experiences with peers,
you can spot patterns quicker and share best practices on
network and endpoint security and employee training.
Whitepaper | 3
4 . B UIL D A SEC UR I T Y F O R T R E S S A ND P R O T EC T I T
W I T H A P ER SI S T EN T WAT CHD O G
Safeguarding your company data requires taking both a micro
and a macro view of your security posture. ISO27001 compliance
provides a useful framework for implementing ongoing security
best practices and you should ensure that your technology
providers follow the same high standards.
You can invest in the best firewalls, network access controls,
encryption, and SIEM technologies on the market, but your
endpoints are still in the hands of the employees. A recent
Verizon study found that 71% of cybercriminals target user
devices (Verizon 2014). With more employees working on the
go, the endpoint has become one of the biggest threats to data
security.
Persistence technology from Absolute acts as a watchdog over
your endpoints and the sensitive data they contain. It offers IT a
trusted lifeline to each device in their deployment, regardless of
user or location. IT administrators can receive encryption status
reports, monitor potentially suspicious devices, and remotely
invoke pre-emptive or reactive security measures such as device
freeze, data delete or data retrieval.
Persistence technology is
embedded in the firmware
of most computer, tablet,
and smartphone devices
at the factory. It is built to
detect when the Absolute
Data & Device Security (DDS)
agent has been removed.
If the agent is missing,
Persistence will ensure it
“Recent breaches
automatically reinstalls, even
if the firmware is flashed, the
at Home Depot and
device is re-imaged, the hard
Dairy Queen were
drive is replaced, or if a tablet
traced back to
or smartphone is wiped
compromises at third
clean to factory settings.
Absolute DDS also enables
party suppliers.”
forensic functionality
for confidential insight into internal criminal activity or noncompliance, as well as the investigation and recovery of stolen
or lost devices. In fact, 80% of endpoint data breach scenarios
can be mitigated with Absolute.
5 . F O R M A N A C T I O N A B L E CR I SI S P L A N
Every organization is just one mistake away from a crisis.
Build a cybercrime playbook filled with attack scenarios and
response actions. Put escalation levels in place and decide how
transparent you want to be about an attack.
A data breach will impact most departments in an organization,
as well as any business associates that may be connected to
the breach. It is important to establish a crisis management
team with the heads of each department including public
relations, human resources, IT, legal, and finance. Key
stakeholders should provide relevant information pertaining to
the incident. For example, in the case of a breach caused by a
compromised device, IT can provide an audit log highlighting a
device’
Please complete the form to gain access to this content