Insider threats: How tech & behaviour can help keep your organization safe
Insider threats are a significant challenge for organisations, as they are perpetrated by trusted individuals with legitimate access to critical systems and data
image for illustrative purpose
Technical indicators include unusual data access patterns, abnormal network traffic, unusual system logon times, and large volumes of sensitive data in unexpected locations. Behavioural indicators include changes in work habits or attitudes, financial stressors or psychological factors, and violation of organizational IT and data management policies
Sustained global economic volatility brings uncertainty to businesses and the workforce. The increased emphasis on reducing operational spending, ongoing layoffs, the evolution of hybrid working strategies, and the cost-of-living crisis are personal and professional challenges that may cause individuals to feel financially insecure at work and at home. With most of the attention on external threats such as ransomware, organized crime, and state-sponsored attacks, insider threats can be even more damaging to enterprises and should not be ignored.
The insider threat landscape is dynamic, and the persistent, diverse challenges these threats pose can be significant. Since insiders are often trusted individuals with legitimate access to critical systems and sensitive data, preemptively detecting their motives and intent can be daunting. Understanding the vital role of technical and behavioral indicators in identifying, mitigating, and protecting against such threats is foundational to a successful insider threat program and improving overall cyber resiliency.
Technical indicators
Technical indicators are typically associated with the digital traces left by user activities, which can be difficult to identify with insider threats. Security teams can look for signals, including unusual data access patterns, abnormal network traffic, unusual system logon times, or large volumes of sensitive data in unexpected locations. Implementing sophisticated user and entity behavior analytics (UEBA) tools can help organizations recognize anomalous behavior and potentially malicious activities.
For example, UEBA can detect sudden mass downloads or data transfers, repeated attempts to access restricted areas or files, and unauthorized external storage devices. These technical indicators can further escalate the risk if individuals are on an observation list as known leavers. Machine learning (ML) algorithms can augment detection by leveraging historical data patterns to identify and alert unusual activities. Furthermore, security organizations can be benchmarked against users’ previous behavior, activity, and peer groups to offer a broader assessment of any potential insider threats.
Behavioural indicators
Behavioural indicators apply to the human element of the detection equation. Human elements significantly contribute to the complexity of insider threats. Insider threats are often precipitated by changes in behaviour, which can serve as early warning signs of a potential issue. Financial stressors or psychological factors can motivate harmful actions, while personal and personnel security practices can mitigate or amplify the risk.
Behavioural cues may range from observable disgruntlement or dissatisfaction, decreased productivity, and frequent conflicts with co-workers to more subtle signs, such as evidence of unexpected lavish lifestyle changes or individuals living beyond their means. Other behaviours can include erratic attendance, changes in mood, substance abuse issues, and working unusual hours. Another frequent indicator is when individuals violate organizational IT and data management policies.
Convergence of technical and behavioural indicators through analytics
Understanding technical and behavioural indicators is pivotal to identifying insider threats. Technical indicators, such as unusual access patterns or data transfers, combined with behavioural indicators, like changes in work habits or attitudes, create a comprehensive profile of potential risks. Threat profiles and insider threat drivers highlight the diversity of insider threats and underscore the importance of recognizing behavioural indicators and understanding technical indicators.
This holistic approach enhances threat detection by recognizing insider threats, often involving technological misuse and human factors. The importance of these indicators lies in their ability to highlight anomalies that enable early detection and prevention of insider threats. By integrating these two dimensions, organizations can predict, detect and mitigate insider threats more effectively.
The multifaceted nature of insider threats necessitates a comprehensive approach. Motivated employees who want to cause significant harm to an organization intentionally don’t have to find clever ways to penetrate the network because they already have legitimate access. They know where valuable data and systems reside and how to gain access and circumvent controls.
Next-generation security information and event management (SIEM) and UEBA solutions can recognize abnormal behaviour observed from potential insider activity indicating malicious intent. These capabilities provide context to the behaviours, actions, and alerts that can be correlated to insider threat models. Understanding these concepts and how the convergence of technical and behavioural indicators can detect insider threats is critical to employing a proactive approach to insider threat management.
(The author is Field CTO, Insider Threat Program, and UEBA Solution at Securonix)