Underestimated risk: insider attack
When people hear the term cyber threat, they often think of large-scale malware attacks such as ransomware, with which criminals attempt to compromise the corporate network. Underestimated, however, is often a danger that already sits in the company building: the insider threat.
Sensitization of careless employees
Raising awareness and training their own employees is one of the most effective defenses companies have against insider threats. This is because most unintentional data breaches result from the actions of a careless employee. Regular data security training teaches employees how to properly handle sensitive company data. In addition, all employees should be informed about new data policies or technologies before they are implemented.
Data-centric security approach
UEBA tools monitor user behavior
User and Entity Behavior Analysis (UEBA) is a cybersecurity process for tracking suspicious or malicious behavior. UEBA tools monitor the user behavior of employees and external contractors with access to applications, accounts, and servers that store sensitive data. To do this, UEBA tools use advanced machine learning algorithms combined with statistical analysis methods to identify potential insider threats. This is done by creating a standard behavioral profile of the user in question, with information such as the location and devices from which a user usually logs in, which files and servers they usually access, how often and at what time, what access rights they currently have, and much more.
If a user downloads a certain amount of data from a certain device every day and accesses a certain number of servers every week, the analytics tool will notice that the account suddenly downloads gigabytes of data from a foreign location or accesses new servers. Thus, the tool will sound the alarm.
UEBA also protects against external threats: For example, it may be relatively easy for cybercriminals to use phishing attacks to steal credentials such as an employee's username and password, but it will be difficult to mimic the default behavior of that user on the network.
By Christoph M. Kumpa, Director DACH & EE at Digital Guardian
More on the topic of insider threat here