Home > United Nations Online Network in Public Administration and Finance (UNPAN)
1. Global
Global
2. Africa
Africa
3. Arab States
Arab States
4. Asia & Pacific
Asia & Pacific
5. Europe
Europe
6. Latin America & Caribbean
Latin America & Caribbean
7. North America
North America
UNPAN Asia & Pacific




Public Administration News  
Share
58% Information Security Incidents Attributed to Insider Threat
Source: http://www.infosecurity-magazine.com
Source Date: Friday, May 03, 2013
Focus: Institution and HR Management
Created: May 07, 2013

The consumerization of computing has changed the IT landscape. Employees can and do now access corporate data from a multitude of devices in a multitude of locations. Where the ‘insider threat’ was once posed only by the occasional malcontent employee, it is now comes from every naive employee on the payroll.

“The genie of company data,” Guy Bunker, Senior vice president of products at Clearswift, suggested to Infosecurity, “is out of the bottle. In the old days,” he explained, “company data sat on a server in the data center protected by access control and perimeter defenses. Now its everywhere.” He was explaining the findings of the Clearswift report, The Enemy Within: an emerging threat, which seeks to quantify a known but not really understood contemporary issue: the insider threat.

Clearswift had commissioned Loudhouse “to identify the extent to which internal security threats are affecting UK organizations and, in turn, how these are being managed.” The result shows an anomaly: while company and media discussion – and company spend – is focused on external threats from hackers and malware, more than half of all security incidents (58%) can be attributed to the wider insider family: employees (33%), ex-employees (7%) and customers, partners or suppliers (18%). One of the biggest problems, suggests Bunker, is the way business is conducted today – anywhere, anytime, any device: the BYOD phenomenon.

“End user expectations,” says the report, “combined with their desire for greater flexibility and autonomy, has seen organizations attempt to empower employees whilst balancing their security priorities.” But the IT department is struggling. Eighty-seven percent of IT leaders (93% in the finance industry) believe the use of new technology requires constant change and evolution within security policy; but 72% admit to difficulty in keeping up.

“The survey shows,” Bunker told Infosecurity, “that companies are realizing that BYOD presents a risk, whether it’s from mobile devices attached to the network, or USB and other secondary storage or services people put data on, and which then goes walkabout.” But many companies simply do not know how to handle this risk. Only 31% of organizations are accepting or proactively managing BYOD – the rest are resisting and blocking access where possible (52%) or denying it altogether (11%). This is despite the belief by half (53%) of the respondents that users will continue to use their own devices on the network, whether it is sanctioned by IT or not. “Even where there is a policy,” added Bunker, “it probably covers around only 20% of the things that it needs to cover.”

The problem is that security traditionally defends devices and perimeters – but with the proliferation of BYOD, cloud, social networks and multi-user collaboration, there is no longer a perimeter to defend, and the devices cannot always be protected. “It doesn’t require the user to have any malicious intent,” said Bunker, “he or she could simply lose it and there’s a breach in the offing.” The solution, he suggests, is to get down and dirty with the information itself: to understand what information is sensitive or confidential together with the context in which it is sensitive and confidential, and to secure the information in context. That way, it doesn’t matter whether the threat is internal or external, because what matters – the information – is secured.

News Home

 Tag This
 Tell A Friend
 Favorite
del.icio.us digg this Slashdot
Rate:
0 ratings
Views: 232

Comments: 0 Favorited: 0 Bookmarked: 0 Tagged: 0



0 Comments | Login to add comment

Site map | FAQs | Terms and Privacy | Contact Us
Copyright 2008-2010 by UNPAN - United Nations Public Administration Network