malicious insiders vs. negligent end users · • malicious insiders can lurk undetected for years...

24
Malicious Insiders vs. Negligent End Users The Human Factor Liam Cleary CEO/Owner SharePlicity Jeff Melnick Systems Engineer Netwrix Corporation

Upload: others

Post on 09-Aug-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Malicious Insiders vs. Negligent End Users

The Human Factor

Liam ClearyCEO/OwnerSharePlicity

Jeff MelnickSystems EngineerNetwrix Corporation

Page 2: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Agenda

• Unwitting employees

• Security intelligence of end users

• Malicious insiders

• Q&A Session

• Prize Drawing

Page 3: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

The Problem

• https://www.domaintools.com/resources/white-papers/survey-report-2018-

cybersecurity-report-card

• Cybersecurity incidents have increased in 2018

• 21% of respondents graded their security programs an "A"

• 42% rated their efforts a "B"

• 92% of grade A companies credited automation to their success

• Companies who graded as "D" and "F" ratings, reported their processes to

be manual

Page 4: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Unwitting Employees

• In most cases, a hacker is allowed access to information by an employee

• "Security is not in my job description" – An Employee

• "Everything should just be Secure" – An Employee

• "Why would anyone want to hack our data, it is just spreadsheets and documents" – An Employee

Page 5: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Unwitting Employees

• These employees have played a part in 52% of ALL data breaches (2016)

• https://www.comptia.org/about-us/newsroom/press-releases/2016/07/21/comptia-launches-training-to-

stem-biggest-cause-of-data-breaches

“Time and time again, we hear of employees causing data breaches, whether that be through leaving a USB device with important data lying around, or clicking on unsolicited links in emails. Such actions are rarely malicious, but more often the result of a lack of training, lack of knowledge or simply general carelessness.”

Graham Hunter, VP Certifications, Europe and Middle East, CompTIA

Page 6: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Unwitting Employees

• "It was just a link in an email"

• South Carolina’s 2013 Department of Revenue breach

• An employee who unknowingly clicked an email link opened the government agency to a

large-scale cyber-attack.

• Cost the state $14 million and compromised the personal and financial data of millions of

residents.

Page 7: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

How do Unwitting Employees get Duped?

Phishing Spear-phishing Personal Devices

Weak PasswordsQuestionable

BrowsingSocial Media

Unsecured Wi-FiFree Software,

Addons or Browser Extensions

Page 8: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Security Intelligence of End Users

• End users have best and good intentions

• Not trying to actively open the door for hackers

• Just want to do their job in the easiest way possible

• Think that they are secure, with how they work

• E.g. Writing passwords on a sticky note under the keyboard

Page 9: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Security Intelligence of End Users

• Not able to spot malicious emails easily

• Not able to spot malicious links easily

• Not able to spot fake emails easily – E.g. Microsoft support emails

• Not able to identify when login pages are fake

• Not checking for valid SSL traffic – Are we really expecting this?

Page 10: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Most Common Phishing Emails

• Amazon Cancellation Scams

• A fake Amazon order and offer to cancel it

• Fake PayPal Scam Emails

• A fake PayPal transaction to alarm you

• Facebook Activity Alerts

• Imitating genuine Facebook notifications

• Disputed Payment Emails

• A false claim that a transaction is due

• Google and Gmail Alert Scams

• Attempts to get your login details

Images courtesy of MalwareBytes and Tech. Co

Page 11: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Security vs Usability

Multi-Factor Authentication

17 Character Passwords

Do Not Click Any Link Ever in Emails

Leave USB Drives Lying Around

Page 12: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

How to Win the Battle

• Ongoing, Relevant and Engaging Training

• "Defense-in-depth"

• Test End Users

• Phishing Simulations

• Educate Threat Intelligence

• Provide Easy Tools

Page 13: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

The Danger of Insider Threats

Page 14: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Why Insider Threats Are So Hard to Detect

• Malicious insiders can lurk undetected for years

• Hard to notice malicious intentions in the daily routine

• Tech-savvy employees are aware of how to conceal harmful

actions

• Malicious insiders can prey on unwitting employees

Page 15: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Why Malicious Insiders Take Risks

Good

moment

Corporate

espionage

Own

business

Revenge

Statement

Data

Ownership

Page 16: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Categories of Malicious Insiders

SaboteurCareer launcher Second streamer

Source: Gartner

Page 17: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

What Malicious Insiders Seek

Business

secretsCustomers

data

Page 18: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Steps to Be Taken

Definesensitive

data

Monitor users

behavior

Use dataclassification

People-centric security

Source: Gartner

Page 19: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

User Abnormal Behavior Analysis

• Someone is actively accessing data

• Someone has undertaken too many failed access

attempts to access data

• Someone is actively accessing stale data

• Someone is accessing data outside business hours

• Someone is trying to log in from different endpoints

• Someone has created new user accounts

• Someone is massively deleting data

Page 21: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Useful links

Online TestDrive: experience Netwrix Auditor with no download or installation

required https://www.netwrix.com/browser_demo.html

Live One-to-One Demo: product tour with Netwrix expert

netwrix.com/livedemo

Contact Sales to obtain more information: netwrix.com/contactsales

If you want to learn more about Netwrix Auditor, register now for the upcoming product demo!

Page 22: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Questions?

Page 23: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

Prize Drawing

Page 24: Malicious Insiders vs. Negligent End Users · • Malicious insiders can lurk undetected for years • Hard to notice malicious intentions in the daily routine • Tech-savvy employees

www. .com

Thank you!

Liam ClearyCEO/OwnerSharePlicity

Jeff MelnickSystems EngineerNetwrix Corporation