Managing the insider risk is extremely complicated

Residential Security Handbook 2022: SMART Living Cyber Security, Residential Estate (Industry)


John Mc Loughlin.

The risk from malicious insiders has long been a priority for CISOs and has now become a top priority for other executives and board members. Employees require access to sensitive information, but heavy-handed approaches using complicated and static rules can frustrate users. This hampers productivity and leads users to search for workarounds that can also put data at risk.

Employees, contractors and partners understandably have concerns about what activity is monitored. They have questions about what data may be in scope or out of scope. More importantly, users may wonder how these monitoring systems may be biased against them and intrude on their personal privacy.

There’s one consistent and prevalent security gap in every digital enterprise in the world. Regardless of the industry, whether it’s financial, healthcare, residential or logistics, the common denominator remains the same: the human element.

A complicated task

Addressing the insider risk is extremely complicated. A recent DTEX report compares two distinct approaches: Insider Risk Management and Insider Threat Surveillance. The approaches share common goals of preventing data loss, detecting insider threats, accelerating incident response and maintaining compliance.

Insider Risk Management (IRM) views the employee as a source of intelligence rather than a subject of surveillance. It effectively flips a model of invasive monitoring to one that anonymises user intelligence and collects only the minimum amount of metadata necessary to build a forensic audit trail, with full respect for an employee’s fundamental right to privacy.

File scanning, email, web, messaging application content capture, keystroke logging and screen recording are not necessary for effective security with a metadata collection model. IRM goes beyond compliance requirements, prioritising employee privacy while still enabling worker productivity.

Insider Threat Surveillance (ITS) technologies have not only employed invasive content inspection, keystroke logging and video capture capabilities, but also often collect more data than necessary for their stated purpose. This creates unnecessary employee privacy issues, as well as significant costs associated with excess data storage and processing.

In some countries it may be illegal to monitor employees (or to use evidence from monitoring) to reprimand or dismiss them unless an Acceptable Use Policy has been well communicated to staff. In countries with well-established data protection laws, organisations must provide information about the processing of personal data, including what type of data is collected, who has access to the data, and under what circumstances monitoring may occur.

Best strategy that delivers results

Businesses need to adapt quickly to changing customer requirements and competitive pressure, and this requires an insider risk solution that takes the best strategies from a variety of approaches.

This could include rules from data loss prevention for known bad behaviour, machine learning,and behaviour analytics based on better data to identify malicious intent, and a privacy-first approach to employee monitoring that protects employees and is used in a proportionate manner.

According to Gartner, surveillance of employee activities is not without risk. Organisations commonly monitor internal communications systems (for example, email or collaboration platforms) and investigate suspected policy violations. But expansion of these activities into a more pervasive inspection of the work life of employees can infringe on employee privacy expectations and rights in the workplace.

Gartner says before organisations explore the use of insider threat tools and services, they must consult legal counsel and human resources leaders, and set boundaries on the capture, storage, sharing, analysis and destruction of data regarding employee activities.

Download the Insider Risk Management and Insider Threat Surveillance e-book (www.securitysa.com/*dtex1) to learn more about the tools available and how workforce cyber intelligence and security can help.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NIST’s impact on cybersecurity
Cyber Security
Through its NIST Cybersecurity Framework, the non-regulatory agency empowers organisations to take a proactive approach towards managing and mitigating cyber risks, enabling them to stay resilient against the ever-evolving threat landscape.

Read more...
Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Read more...
AI-powered cyber protection for consumers
IT infrastructure Cyber Security
Acronis Cyber Protect Home Office is designed for the evolving landscape of cyber threats by integrating Acronis' cyber protection and secure backup solutions, combining AI-powered defence mechanisms, robust data backup, remote management tools, and mobile device protection.

Read more...
A surge of cybersecurity for the energy sector
Government and Parastatal (Industry) Cyber Security
With a rapid transition towards renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regards to cybersecurity, as it depends on interconnected systems and digital technologies.

Read more...
Secure backup strategies imperative for business continuity
IT infrastructure Cyber Security
Cybercrime is on the rise, and businesses need to adjust how they manage their data to fend off attackers, or risk irreparable damage, writes Lisa Strydom, Senior Manager Channel and Alliance for Africa at Veeam Software.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...
Mitigating escalating DDoS cyberattacks
Cyber Security
As cyberattacks, particularly those of the Distributed Denial of Services (DDoS) variety, continue to rise at an unprecedented rate across Africa, it is no longer a question of ‘if’ your organisation will be targeted, but rather ‘when’.

Read more...
Six effective antidotes to modern cyber adversaries
Cyber Security
As the head of cybersecurity at NEC XON, Armand Kruger has witnessed the transformation from hooded hackers to a sophisticated dark economy that poses unprecedented threats and is run like a business.

Read more...
Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Read more...
Cyberattacks are inevitable for small businesses
Cyber Security
The recent cyberattack on Microsoft is a stark reminder that no organisation, regardless of its size or industry, is immune to cyber threats. Even small businesses, often assuming they are less attractive targets, are vulnerable.

Read more...