Connect with us

Hi, what are you looking for?

News

Internal attacks on companies have grown by 31% in the last three years

The damage caused by internal attacks on the information systems of companies in the US grew by 31% in the last three years

Internal attacks on companies have grown by 31% in the last three years

The damage caused by internal attacks on the information systems of companies in the US grew by 31% in the last three years, with an average cost of more than 11 million dollars, according to the 2020 Cost study of Insider Threats : Global. There was also a 47% increase in the frequency of incidents that, on average, take 77 days to contain. Of the three main profiles – negligent users, infiltrators and credential thieves – the latter are the ones that cause the most damage, although they only represent a quarter of the attacks.

To help curb this emerging threat, AUTELSI has prepared a paper that analyzes this problem, which has served as the basis for the meeting “Internal Cybersecurity Threats: Insiders ” in which Mikel Salazar Peña, Head of Cybersecurity for Iberia at DXC Technology , presented a roadmap and best practices and technologies to combat insiders .

Telecommuting has exponentially increased risk due to the use of insecure connections, the use of personal devices and the blurring of the perimeter, problems that add to the already complicated threat landscape of the pre-pandemic.

For Mikel Salazar Peña, in the battle against the ‘ insiders ‘ it is necessary to focus on three key principles. The first is Reduce complexity. Identify and understand the risk to which organizations are exposed, having a clear starting maturity level and entry vectors. In addition to compliance with regulations, it is essential to have a plan prepared in case the organization is compromised and to have reputational and operational impact management protocols.

The second is Protect the data. “We have to change the chip, before the focus was on securing the network, now the urgent thing is to pay attention to data and identity. We recommend the implementation of the Zero Trust model where any user or element is a potential threat, regardless of whether it is internal or external. Thanks to Zero Trust we will have a reinforced authentication, verification processes and improvement in the visibility of the use of the data in a transversal way”, declared Mikel Salazar.

Its implementation requires strong authentication (supported by multifactor and conditional access solutions), in a reliable device (free of vulnerabilities and with advanced EDR response systems). It will also be essential to ensure the principle of least privilege. In the case of verification, it will be essential to incorporate User and Entity Behavior Analysis (UEBA) systems supported by artificial intelligence and machine learning for the advanced detection of this type of ‘ insiders ‘.

The third focus is to place Security at the center. The employee is the first line of defense and a good training and awareness plan that includes reinforced policies, security updates and continuous training is essential. At a corporate level, it is essential to sponsor the management, creating a culture of security, applying the principle of the ” secure ” principle. by design ”.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Tech

Marketing departments that use gamification manage to improve consumer engagement and enhance interaction with the brand.

News

Bitcoin is the best known cryptocurrency and possibly the most important of the moment. In this article we are going to focus on the...

Business

Ingram Micro Commerce & Lifecycle Services , a leading provider of global supply chain management and e-commerce logistics solutions, has announced the launch of...

Business

The three experts who have starred in the new day of the free digital training program " Fast Forward Sessions " have recommended SMEs...