“Not every insider risk becomes an insider threat, but every insider threat started as an insider risk.” -- Gartner
Gartner’s take on the difference between insider risks and insider threats highlights an important nuance that drives the cybersecurity strategies and solutions you should apply to safeguard your organization.
Unlike “insider threat,” the term “insider risk” doesn’t imply malicious intent or blame the user. It incorporates the common scenario of a well-intentioned person making a mistake. In fact, Ponemon says that more than 50% of insider incidents are attributed to errors and carelessness, such as system misconfigurations and unauthorized or accidental data disclosure.
When you consider that insider incidents have risen 44% over the past two years, with costs per incident up more than a third to $15.38 million, understanding indicators for both insider threats and insider risks is essential to reducing the potential impact for your business.
If you’re scoping an enterprise risk management program or reinforcing employee awareness training, it’s a great time for a deep dive on insider behavior. Read on to learn insider behaviors that increase your risk and common insider threat indicators to watch for. With this information, you can immediately implement effective strategies to reduce risk and act on those threat indicators.
What are insider threat indicators?
Insider threat indicators are suspicious behavioral patterns or unauthorized activities that identify a person or other entity within an organization as a potential security risk. These risks typically increase when people such as employees, interns, contractors, suppliers, partners, and vendors have privileged access to an organization's data and systems.
A Delinea survey provides insights into suspicious credential activity that could be potential indicators of insider threats. We asked IT and business decision-makers at 300 companies, “what, if anything, are the best ways to help you detect suspicious credential activity?”
Their top answers were:
1. Unusual access times outside of normal business hours | 53.62% |
2. Unusual logon activity accessing credentials such as multiple sessions | 50.99% |
3. Unknown locations accessing resources | 43.09% |
4. Failed logon attempts from passwords or MFA | 40.79% |
5. Unknown devices accessing resources | 37.50% |
6. Impossible travel indicator | 25.99% |
Understanding the differences between malicious insiders and those who make unintentional mistakes is crucial for recognizing indicators of insider threats and developing effective security measures to prevent and contain them.
Here are the key differences to consider:
Q: What insider threat indicator would have alerted Phineas' current employer?
A: Unusual access time and large downloads.
Q: What insider threat indicator would have alerted her client?
A: Unknown devices accessing privileged resources.
Common workplace behaviors and processes expose your organization to insider risk, such as:
Now that you know the indicators of insider threats, how can you lower your risk?
Traditional threat hunting and eradication methods designed for external actors aren’t appropriate to prevent, identify, and contain insider threats and lower insider risk. Rather, effective detection of insider threats requires a combination of technical tools, behavioral analysis, and employee awareness.
1. Deter people from becoming an insider threat
Empower people to get their work done productively and securely, without putting the onus for following complex security processes on their shoulders.
Remove broad, standing access, including local administrative access on workstations. That way, automated, policy-based controls step in to prevent a user from seeing or exposing sensitive data, changing system settings, or introducing malware into your IT environment.
Remember those all-powerful admins? You can reduce the risk of accidental as well as intentional insider abuse by limiting their powers as much as possible. Ensure admins operate with limited privileges unless they need to elevate them, and then only on a limited basis.
2. Detect insider threat indicators with automated tools
UEBA solutions use machine learning to detect anomalies and outliers in user and entity behavior, helping identify potential insider threats. Data Loss Prevention (DLP) systems can alert administrators to unauthorized data downloads and transfers. Privileged behavior monitoring can add more intensive surveillance mechanisms for high-risk environments and users.
Know the common times when insider risk increases, for example, when the company has a large layoff, a new partnership is formed, or new workplace tools are integrated. At those times, it’s a good idea to increase your monitoring of insider threat indicators and add requirements for authentication and access.
3. Disrupt insider threats
Consider software that implements active blocking technology, preventing specific data types, fields or files from being able to leave the organization. Few companies rely on fully automated processes like yanking employee access to critical systems. Rather, they prefer to investigate and confirm the reason for unusual insider behavior, provide warnings, and increase security controls.
Simply put: Everyone is responsible!
Knowing insider threat indicators and knowing how to report them are important aspects of cyber awareness.
At the very least, you should have monitoring and alerting mechanisms in place, based on the common indicators of insider threats and a behavior-based risk model.
In addition, your security operations team might establish an insider threat-hunting program to actively seek out suspicious activities.
Good cybersecurity awareness training allows all staff members to identify and report suspicious behavior. Encourage a culture of trust and reporting among employees so they feel safe to do so. Anonymous reporting mechanisms can provide valuable insights into potential indicators of insider threats.
Looking ahead
Insider risk shows no sign of slowing. Remote work, systems integration, and dependence on service partners and other third parties in extended supply chains are bound to increase the potential for both accidental insider behavior and malicious insider threats.
Organizations spent an average of $15.38 million in 2021 to deal with insider threats—up 34% from the $11.45 million in 2020. Cyber leaders need to do all they can to understand and stay on top of the indicators outlined here as cybersecurity budgets get tighter.
This is the time to implement the strategies discussed in this blog so your organization is prepared.