Insider abuse and data misuse account for over a third of data breaches in financial service organisations and must be accounted for by controls. Protecting against insider threats requires solutions that can discern between legitimate use and malicious intent and be deployed quickly at tremendous scale.
Many security vendors are claiming to solve insider threats, causing confusion among security teams who are new to the insider threat space. The fact is, insider threats take many different forms, making them difficult to detect, investigate and mitigate.
Insider threat surveillance tools evolved from 'employee monitoring' software, traditionally deployed to monitor targeted high-risk endpoints or for employees with prior negative conduct or suspicious history.
These solutions rely on invasive capabilities to react to insider threat activities including computer screen recording, conversation content scanning, file content scanning, e-mail content scanning and keystroke logging.
Insider risk management (IRM) solutions then emerged from the convergence of specific attributes taken from endpoint DLP, user activity monitoring (UAM) and user and entity behaviour analytics (UEBA). They leverage a metadata approach combined with advanced behavioural analysis to arrive at the same outcomes as the insider threat surveillance solutions.
Some key benefits of the IRM approach are the ability to identify risks and threats without impacting privacy, endpoint performance and, most importantly, the capability to proactively remediate insider incidents before they actually happen.
Unlike intrusive employee surveillance capabilities that are system resource and network bandwidth intensive by nature, requiring larger than normal processing power from the endpoint device and additional cloud storage, IRM offers the ability to readily scale to hundreds of thousands of endpoints with continuous visibility in near real-time.
This means out-of-the-box automated reports and dashboards containing intuitive and pivotable visualisations that are easy to understand and actionable within hours of install.
A modern insider threat platform must provide an integrated solution that replaces the following legacy point solutions: User activity monitoring (UAM), internal fraud and forensics tools, data loss prevention (DLP) and user behaviour analytics (UBA).
Dtex InTERCEPT is a next-gen insider threat platform that replaces legacy point solutions in a unified solution, while also delivering the following critical requirements:
- Scales to the entire organisation;
- Near-zero impact to endpoints and network;
- Noise-free telemetry with 24x7 audit-trail;
- Cloud-first and deploys in hours; and
- POPIA/GDPR compliance out of the box.
Here is a guideline for an insider threat program to identify real-world attacks:
Reconnaissance
When preparing for data theft, the user typically begins with research. This is where they locate the data that they would like to steal, or, in the case of compromised credentials, where the insider will test the bounds of the stolen credentials’ privileges.
Circumvention
This is the stage where the insider attempts to get around existing security measures, such as web blocking, DLP tools, etc. It is particularly important to have visibility into this activity because it can shed light on intent: If a user is going through great lengths to get around company security, they are acting very deliberately.
This is also often where organisations can see where their security tools are failing. By capturing circumvention activity, Dtex shows analysts where and how users are able to bypass existing measures.
Aggregation
This is when the insider assembles all of the data that they plan to steal, often moving it into one file directory or compressing it in a single location.
Obfuscation
In the obfuscation step, the insider will cover their tracks in order to avoid detection, often by renaming files, changing file types or by using more advanced tactics such as steganography. This is another important step to capture in order to prove malicious intent, as well as to understand where other security tools might be failing.
Exfiltration
This is the final step in the process of stealing data: The moment that the data is actually transferred out of the organisation. Many security tools focus only on this specific step, and often by way of blocking tools. Rigid rules, however, can’t catch the hundreds of methods that can be used to get data out of the organisation.
Since Dtex sees all activity from the point closest to the user, it has visibility into less common exfiltration methods that other tools often miss.
Conclusion
J2 Software is the provider of Dtex for Africa, working together for more than 16 years to identify and prevent losses from insider threats.
The latest market guide from Gartner, titled: ‘Gartner 2022 Market Guide for Insider Risk Management Solutions’ discusses the state of insider risk management solutions, including an analysis of available tools.
Share
J2
J2 is a security focused African technology business founded in 2006 to address the need for effective cybersecurity, governance, risk and compliance solutions in Africa.
The continued rise of cybercrime, identity theft and confidential data leakage drives the requirement for J2’s managed security service offerings, not only for competitive advantage, but as an absolute business necessity. The company offers managed cyber security services for every business. We ensure that you have greater visibility to identify risky behaviour and enhance the capability to respond to prevent losses.
J2 delivers essential tools that empower organisations to take control of their technology spend. The company's hand-picked solutions provide complete visibility over its customers' environment, while reducing risk and lowering costs.
J2 has provided services and solutions to renowned enterprise corporations with sites running in South Africa, Angola, Botswana, Kenya, Malawi, Mauritius, Mozambique, Tanzania, Uganda, Zambia, Australia, UK and Malta.