IT Brief Australia logo
Technology news for Australia's largest enterprises
Story image

Trust no one: Recalibrating security to address insider threats

By Contributor
Tue 22 Jun 2021
FYI, this story is more than a year old

Article by archTIS CEO Daniel Lai.

The topic of insider threats is far less often discussed than external threats such as a rogue ‘hacker’, or an advanced nation-state actor. Despite this, as organisations increasingly get better at protecting their networks, attackers are changing tactics and increasingly utilising insider threats to meet their goals.

Before an organisation can defend against an insider threat, it needs to recognise that this article actually discusses three different categories of insiders:

  1. Negligent insiders, who inadvertently compromise data. The employee that sends a sensitive file to the wrong recipient is the classic example here.
  2. Malicious insiders, who are individuals that join an organisation with the intent of gaining access to intellectual property and data, to commit fraud, sabotage or other acts of espionage.  
  3. Compromised insiders, whose credentials are unknowingly stolen and used by a bad actor. 

Of the three, it’s the malicious insiders that tend to make headlines and cause the most damage. A survey conducted by Cybersecurity Insiders found that more than two-thirds (68%) of the security leaders confirmed that insider attacks were growing in frequency and acknowledged that they were vulnerable to these attacks.

The high profile cases of Edward Snowden and Chelsea Manning also provide an enduring yet often overlooked lesson about these types of insider attacks: by the time-sensitive data has been exfiltrated, it’s already too late.  

This past June, an employee at Tesla was discovered to have exfiltrated large amounts of highly sensitive data to unknown third parties. For a global enterprise like Tesla, intellectual property constitutes one of its most prized and valued assets. The ramifications of such a leak can have material consequences - both to the brand and the bottom line.  

Defending against these different types of insider threats requires a completely different strategy to traditional cybersecurity approaches. They present a challenging set of questions for cybersecurity professionals: 

  • How do organisations secure sensitive data when a trusted user’s credentials are compromised by an unidentified third party? 
  • What can organisations do to ensure a sensitive file isn’t inadvertently shared with someone who shouldn’t have access? 
  • How do organisations strike the right balance of providing contractors and other trusted third parties with the access they need to do their work without impacting productivity?  

This is often uncomfortable territory. As an industry, security is great at focusing on networks and credentials-based access, but this category of threat completely bypasses those defences. Organisations instead need to take a more granular, data-centric approach that embeds modern security and access controls at the file level. 

Extending zero trust to the file level 

A data-centric, policy-based approach based on the principles of ‘Zero Trust’ is a far more effective methodology than anything credentials-based in order to ensure data remains secure. A zero trust approach to security dictates that organisations must not automatically trust any user inside or outside their perimeters. Instead, organisations must verify anyone and everything trying to connect to any systems or applications before granting access to them.  

Attribute-based access control (ABAC) extends the Zero Trust security model to the file level by evaluating attributes (or characteristics of data and/or users), rather than roles, to determine a given file’s access, usage and sharing rights.

The advantage of a data-centric ABAC-based security approach is security can be adjusted to the sensitivity of the file and the user’s context to evaluate and validate each file’s attributes including security classification and permissions, as well as attributes such as security clearance, time of day, location and device to determine who is able to access, edit, download, or share a particular file. 

A data-centric approach enables granular control over the access of information by adjusting security in real-time to determine whether the user should be given access to the requested information based on all of these parameters at any given point in time. If the user scenario does not match or appears suspicious, then access is denied, or a restricted view of the data is provided. For example, if an authenticated user is trying to access a sensitive file they own, but it is outside of business hours and they are using a BYOD device in another country, file access will be denied – effectively thwarting the efforts of a hacker using stolen credentials. 

As society moves to a more distributed model of work, it’s essential that security leaders are able to move towards more flexible security policies and architectures that can adapt and meet threats from wherever they might come. 

This means challenging the ideas and skills organisations have honed for decades. This change however shouldn’t be feared but embraced: by changing methodologies, along with thinking, organisations can start to get ahead of threats (no matter what shape they take) to protect the most valuable asset – data.

Related stories
Top stories
Story image
LG Electronics
LG Electronics brings on Aussie AV distributor Alloys
LG Electronics Australia Business Solutions has appointed Australian AV distributor Alloys as a new distribution partner.
Story image
Energy
Sustainability huge factor for APAC data centre managers
A new report reveals that 85% of data centre managers in APAC believe that sustainability will significantly impact operations and decision making.
Story image
Pegasystems
Marketing technologies set to increase revenues - study
Marketing leaders say that investment in new marketing technologies (MarTech) will drive significantly increased revenues.
Story image
Equinix
Aussie businesses buckle down on digital tech investments
Australian businesses are planning major investments in digital technologies to support ambitious expansion plans.
Story image
Malware
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
Story image
Capital
Rubber Monkey gears up for Aussie market with latest capital raise
Rubber Monkey is seeking to raise up to NZ$2.5 million of new capital through online investment platform, Snowball Effect.
Story image
Sustainability
Honeywell named Frankston facility services provider
Honeywell has been named the joint facility services provider for Frankston Hospital’s AU$1.1 billion redevelopment.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Southern Cross Cable
Southern Cross Cable launches the SX NEXT cable to connect NZ to the world
The new Southern Cross NEXT fibre cable (SX NEXT) is set to connect Australasia to the US and further enhance connectivity between New Zealand, Australia, and the US.
Story image
ABI Research
NaaS market expected to reach $150B by 2030 - research
"The market is immature and fragmented, but telco market revenue will exceed US$75 billion by 2030 if they act now and transform to align with requirements."
Story image
Apple
Your tools, your choice: why allow employees to choose their own devices?
Jamf Australia says giving your team the freedom to work with their digital device of choice could help to attract and retain top talent in a tight labour market.
Story image
Storage
EXCLUSIVE: Finding the best data center for your business needs with datacenterHawk
Companies using cloud are consistently looking for the best storage solutions to suit their enterprise needs and often have to go through rather complex processes in order to find the right fit.
Story image
Wiise
Four things wholesale distributors need to consider for FY2023
In a post-pandemic world, there are many things for a distribution business to juggle. ERP solutions company Wiise narrows down what companies should focus on.
Supply chain
Discover the 4 critical priorities for wholesale distribution businesses in FY23. Are you worried about how supply chain issues may affect your business in 2023?
Link image
Story image
Cloud
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Story image
Airwallex
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
PwC
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Story image
Metaverse
How the metaverse will change the future of the supply chain
The metaverse is set to significantly change the way we live and work, so what problems can it solve in supply chain management?
Project management
Discover the 4 crucial factors for choosing the right job-costing solution. Is your team struggling to cost jobs and keep projects running on budget?
Link image
Story image
Data Protection
Five signs your business is ready to move to the cloud
Many organisations are thinking about moving to the cloud. But what are the signs you are ready, and what are the reasons to move?
Story image
ASI Solutions
Western Australia CUA panel picks ASI as preferred supplier
Western Australia's Common User Arrangement (CUA) panel has chosen ASI Solutions as a preferred supplier for device hardware.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Productivity
Discover the 5 ways your ERP may be letting you down. Is your current system outdated, difficult to manage, and costing you a fortune?
Link image
Story image
Document Management
Regaining digital trust and enhancing digitisation in Australian Government agencies
Having a digitised ecosystem of documents, tools and data can help bolster security, improve workflow and ultimately create better services.
Story image
Apple
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
ABI Research
75% of 5G networks to advance to 5G-Advanced by 2030
5G-advanced is set to launch in 2025, and 75% of 5G networks will upgrade by 2030, according to ABI Research. 
Story image
Microsoft
Elders signs five-year agreement with Microsoft to boost innovation
Australian agribusiness Elders has signed a five-year agreement with Microsoft that looks to transform its customer experience, efficiency and sustainability outcomes.
Story image
Payroll
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
Media
Registrations for the W.Media Sydney Cloud and Datacenter Convention 2022 now open
Are you a C-Level executive looking to enhance your knowledge in the cloud and data center space in order to get the best results for your company?
Story image
Cybersecurity
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why it's time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Accounting
Four factors to consider when choosing the right job accounting solution
Progressive job-based businesses can achieve success by strengthening their ability to quantify every cost attributable to the delivery of an outcome for a customer.
Story image
Cybersecurity
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
Story image
IDTechEx
The next stage for 5G in thermal materials - IDTechEx
IDTechEx says higher frequency deployments, such as mmWave devices and very different station types such as small cells, present their own technological evolution and, with it, thermal challenges. 
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
Cybersecurity
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Document Management
NZ's FileInvite raises $10M in latest investment round
FileInvite has raised $10 million in Series A investment to fast-forward the extinction of email for requesting and collecting documents online.
Story image
Artificial Intelligence
Decision Inc. partners with provenio.ai to expand offering
Decision Inc. Australia has partnered with provenio.ai to expand its offering to clients in the retail, FMCG, manufacturing, supply chain and logistics sectors.
Digital Transformation
Discover the 5 signs your business is ready for a cloud-based ERP. Is your business being left behind as more of your competitors switch to the cloud?
Link image
PwC
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image
Story image
CSG
To win at 5G, telcos must tame their quoting chaos
The catalogs of CSP (communication service providers) market offerings are set to explode as new digital services emerge, powered by B2B2X business models.
Story image
Telstra
Ericsson and Ciena, Telstra enhance service capacity for Telstra's optical network
Ericsson, Telstra, and Ciena have announced new enhancements to Telstra's Next Generation Optical Network, which will increase the service capacity of Telstra's optical network to 400 GE (Gigabit per Second Ethernet).