Story image

Cyber threats coming from the inside

21 Apr 16

Awareness amongst business leaders around IT security, particularly within government, is on the rise, according to SolarWinds, who says company data leaks dominating news headlines is contributing to the increase.

“If you were to check the newspapers today you could almost guarantee there would be a story on the latest IT hack,” the company says.

SolarWinds says the high profile nature of these cases are helping drive the understanding that these threats are no longer coming from a cyber-gang nested in a secret hiding place and hacking into the servers of businesses on the other side of the globe.

“It instead helps businesses realise that they should perhaps be looking a little closer to home,” the company warns.

A recent survey by SolarWinds found that 53% of government IT professionals identified careless and untrained insiders as the biggest IT security threat.

Joel Dolisy, CIO at SolarWinds, says despite this, it remains to be seen whether maliciousness was intended or not.

Dolisy says there are some things businesses can do to help address the growing issue of insider threats.

Automate network configurations

Although IT teams are often stretched and battling budget constraints, by automating the network configuration process the procedure could be carried out much more efficiently, Dolisy says.

“An automated tool can perform scheduled network configuration backups, bulk change deployment for thousands of devices and all with minimal input from the IT pro, freeing up valuable time,” he says.

“As well as limiting the concern over insider threats, these tools can also catch configuration errors and automatically notify the administrator of any compliance issues, making their lives much easier.”

Know who is accessing the network

Dolisy says the BYOD boom has added a great deal of risk to organisations as employees choose to use their own devices.

“Losing a laptop or having a smartphone stolen out of a bag can lead to vast amounts of vulnerable data which can prove catastrophic to the organisation if something is leaked or worse, compromised,” he explains.

By creating a policy that allows the team to track and monitor devices, switches and ports, IT pros can block unauthorised devices from accessing the network, says Dolisy.

“To ensure maximum security, it is best to develop a ‘whitelist’ of all the devices which are allowed to infiltrate the network and flagging any devices outside of this list which attempt to gain access,” he says.

Nonstop network monitoring 

“Ideally an IT pro would be omniscient,” Dolisy states.

“But since it’s impossible to be aware of everything that is happening on the network, investing in a solution, such as security information and event management (SIEM) and log and event management software, can automatically monitor the network for any anomalies and alert administrators of any potential breaches, data leaks, unauthorised users, or suspicious activity,” he explains.

“This frees up an IT pro’s time to focus on solving the problems flagged,” says Dolisy. “It also allows them to pinpoint where the root of the problem is and identify the user who could be unintentionally compromising the network.”

Veeam expands cloud data management capabilities for IBM, AWS and Azure
The new capabilities supposedly deliver cost-effective data retention, easy cloud migration and data mobility.
Schneider Electric edge technology implemented at Tuggeranong Office Park
“The new system at Tuggeranong Office Park provides market-leading solutions to the entire facility."
Silver Peak hits big four with Google Cloud agreement
Silver Peak is the only SD-WAN vendor to partner with all four leading public cloud providers – Amazon, Google, Microsoft and Oracle.
Comms providers hit by most DDoS attacks in Q3 2018
New data indicates attackers preyed on the large attack surface of ASN-level communications service providers with a ‘bit-and-piece’ approach.
MNF Enterprise brings calling to MS Teams
Businesses can now use Microsoft Teams for local and international phone calling from their computer or device.
Survey reveals CX disconnect is risky business
Too much conversation and too little action could lead companies to neglect, lose, and repel their very lifeblood, according to Dimension Data.
Should AI technology determine the necessity for cyber attack responses?
Fujitsu has developed an AI that supposedly automatically determines whether action needs to be taken in response to a cyber attack.
Microsoft Azure ExpressRoute launches in Perth
This new ExpressRoute location will offer Perth organisations a direct and private connection to their Microsoft cloud services.