UK Businesses All Talk and No Action When it Comes To Insider Threats, Reveals LogRhythm Research

As more than two fifths of employees admit to having stolen confidential information, little action is being taken by employers to defend against and punish perpetrators – leaving gaping security holes

London – Tuesday 15 April, 2014 LogRhythm, the Security Intelligence company, today announced the results of a survey that suggests that while businesses are growing increasingly aware of the insider threat, they still lack enforceable controls to stop and punish perpetrators. The survey of 1,000 IT professionals, conducted by OnePoll on behalf of LogRhythm, found that more than a third (36 percent) of IT professionals believe employees would access or steal confidential information, yet 38 percent do not have, or know of, any systems in place to stop employees accessing unauthorised data. Surprisingly, less than half (48 percent) regularly change passwords to stop ex-employees gaining access and the most commonly used deterrent is the threat of disciplinary action (64 percent).

However, in a corresponding survey of 200 employees, almost half (47 percent) admitted to having accessed or taken confidential information from the workplace, with 41 percent using passwords and usernames to access data after they had left a company. Notably, of those who had been caught, a quarter said nothing happened, while 67 percent were spoken to, but no disciplinary action was taken. Even more worrying is that 79 percent claimed their illegitimate actions had never been identified.

“While it is clear that the risk of rogue insiders is making its way up the corporate agenda, what’s not clear is how organisations are dealing with nefarious employee activity,” said Ross Brewer, vice president and managing director for international markets at LogRhythm. “In LogRhythm’s 2013 research, just 19 percent believed employees would steal data, a number which has nearly doubled in the last year, indicating that businesses are slowly waking up to the realities. What is baffling is that, despite this, the majority of organisations are still not putting adequate systems in place. Indeed, it is not only staggering that such a large number of employees have never been caught accessing confidential data, but that those who have been have often got away with it scot free. ”

“What we can take from this is that most organisations still have very little idea of what is happening across their networks,” continued Brewer. “Even when faced with daily reports of internal security threats, such as the recent Target breach, as well as government initiatives to increase awareness, businesses are still inclined to turn a blind eye. At a time when the threat landscape is so vast and the repercussions are so big, this is simply unforgivable.”

While more IT professionals cite the insider threat as a bigger security risk (31 percent) than external threats (29 percent), the general consensus seems to be that not enough importance is being placed on containing it, with 37 percent feeling like their business could do more to safeguard information from employees. Considering that a third also have no idea whether or not they have suffered a breach before, it appears there is still a long way to go.

“It is astounding that a third of IT professionals cannot say whether or not their organisation has ever suffered a breach – surely this knowledge should be the bare minimum? Without knowing what happened yesterday, businesses have little hope of protecting their networks today,” continued Brewer. “Businesses clearly need to increase the level of visibility that they have into their networks in order to spot any questionable activity. By tracking every single event that occurs within the IT infrastructure – both from internal and external sources – and defining ‘normal’ behaviour for users and systems, organisations will be able to identify and remediate any breaches as soon as they occur. Only by acquiring this in-depth knowledge and strengthening access control strategies, will businesses be able to truly defend themselves.”

LogRhythm encourages organisations to make better use of the machine data generated throughout an enterprise so that potential threats can be identified before they have a chance to escalate. Using security intelligence platforms such as next generation Security Information and Event Management (SIEM) as part of an integrated Protective Monitoring strategy enables automated, centralised collection and analysis of log and machine data that ensures anomalies are identified as they occur. Developing this deep insight requires the ability to see even minor changes that may occur across the IT estate, such as files being altered or copied to portable storage devices.

About LogRhythm

LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency.

With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com.

Comments are closed.