Repair Centre Location:

Motherwell | North Lanarkshire

TTG Phone Number:

01698 533212

Customer Service Email:

cs@thetechguys.site
The Growing Problem Of Insider Cybersecurity Threats – And How To Stop Them

The Growing Problem Of Insider Cybersecurity Threats – And How To Stop Them

Cybersecurity continues to be of deep concern to global CEOs. In fact, it was ranked as the fourth-biggest threat to company growth in 2020 – rising a spot from the previous year – according to PwC’s 23rd Annual Global CEO Survey released recently. There is a reason for all this worry.

According to the Identity Theft Resource Center, the number of U.S. data breaches tracked in 2019 increased 17 per cent from 2018, with 1,473 data breaches exposing more than 164 million sensitive records. Even more alarming, the issue
of data, breaches appear to be getting worse.

Consider this:

From January 2019 through June 2020, at least 16 billion sensitive records have been exposed globally. These records include credit card numbers, home addresses, and phone numbers. That’s not all. The first quarter of 2020 has been one of the worst in data breach history, with more than eight billion records exposed globally, according to the Risk-Based Security 2020 Q1 Data Breach QuickView Report.

Overlooking What’s Right in Front of Us

Certainly, these attacks can cause massive damage to any business, which is why so many CEOs worry about them and spend great sums of time and money to try to prevent them. Unfortunately, all of this focus on external attacks has caused
us to overlook – and prevent – potential insider threats created by employees, contractors, and other trusted associates who have easy access to your network.

According to the Ponemon Institute’s Cost of a Data Breach Study, along with hackers, malicious insiders are the leading cause of data breaches. What’s more, incidents caused by insiders tend to have larger costs than other breaches.

The study reported that, over the last two years, the number of insider incidents has increased by 47%. While that is shocking, this is even more so: A staggering 60% of organizations suffered more than 30 incidents per year.

Here’s even more bad news: Over the same period, the cost of insider threats has increased by 31%, with the average insider incident now costing organizations $11.45 million.




Are You Next?

Don’t believe these types of insider incidents can happen? Last year, Canadian banking group Desjardins suffered a data breach that affected some 2.7 million people and around 173,000 companies. The stolen information included names,
addresses, dates of birth, social insurance numbers, email addresses, and information on customers’ transaction habits. The source of the breach? An employee with “ill-intention,” according to Desjardin.

While malicious insider activity can be devastating, it is still not the norm. According to the Ponemon Institute study, two out of three insider threat incidents are caused by employee and contractor negligence. In other words, when an
employee or contractor plugs what appears to be a harmless USB flash drive or smartphone into an open port, it can be the triggering event for an insider threat incident.

Insider threats aren’t going away anytime soon. In fact, they are getting worse. According to the Cybersecurity Insiders 2020 Insider Threat Report, 70% of organizations are reportedly seeing more frequent insider attacks.

More Needs to Be Done

So why aren’t we doing more to stop insider threats? Maybe it’s because the solution seems so daunting that no one knows where to begin. If that describes you and your organization, let us suggest the first, easiest, and least-costliest
step is to lock all of you open computer and network ports. If employees, contractors, and others cannot access your network through open ports, then a large part of your problem is solved. So, you might be thinking that anyone can simply unplug a port connection that is in use and plugin there. Yes, they can, which is why you need to lock your active connections, too.

While USB port locks, network module locks, LAN cable locks, and secure USB hubs for your attached USB devices aren’t foolproof – if someone wants to access your ports badly enough, they’ll find a way – they serve as an effective deterrent to both the malicious and unintentional threat. The malicious threat would certainly be noticed trying to destroy and bypass a port lock, while the unintentional threat would be thwarted entirely simply by not being granted
access to your ports.

If the cost of locking all your ports seems more than you can bite off, first consider that port locks cost as little as £4, and then consider that the average cost of an insider incident is now £11.45 million and rising.

On which side of this financial equation do you want to be?

Leave a Reply