Data in the Cloud

And the heightened insider threat

All too often, businesses are so focused on keeping attackers out that they forget another, even more troubling source of risk: their own employees. 'Insider threat’ is the risk of a breach enabled, caused, or carried out by an authorised user.

It’s growing exponentially as the cloud pushes data ever further across ever-larger networks, necessitating increasingly complex access arrangements. And the result, according to data from ID Watchdog, is that a whopping 60 percent of data breaches in 2020 were connected to or resulted from insiders.

Traditional identity measures are fast becoming irrelevant

Here’s an example to show the scale of the problem. Eighty-one percent of data breaches start with a stolen or weak login credential – because passwords are just too easy to compromise. Every time a major attack hits the headlines, with user data spilling out onto the internet like oil from a tanker, chances are some of your employees’ passwords are in the flood.

If they reuse those passwords across multiple sites (which a recent Google survey suggests around two thirds of them do) then your systems are at risk. All it takes is for an attacker to buy an employee’s login details from the leak, connect that person with your company, try their details on your system – and the digital door swings wide open.

81% of data breaches start with a stolen or weak login credential

To make it worse, there’s nothing in that process that would trigger traditional security systems – so your newest ‘employee’ could theoretically wander around inside your systems undetected for days on end.

The risk associated with employees doesn’t stop at the weakness of traditional passwords. One-time password (OTP) systems briefly offered a solution, but as attacks have grown more sophisticated, OTPs sent by legacy systems have become vulnerable to interception, phishing, and man-in-the-middle attacks.

And of course, all this assumes the employee is an innocent party. But in most cases, ‘insider threat’ means a breach of trust rather than a breach of security. The reality is that malicious activity does happen – whether for financial gain, in response to perceived mistreatment, or in service of a new employer. Unless identity services are up to the challenge, movers and leavers can retain access to sensitive data for far longer than they should.

Security vs usability conundrum

So, the question for mid-market businesses is: what to do? The temptation can be to do the cloud equivalent of locking everything into a big chest, behind a gate, over a drawbridge, digging a moat, and then requiring a different kind of ID to get through each barrier. Then, you think, our information will be secure.

The problem is, if your ID management is too good, it stops your employees from doing their jobs. Nothing brings productivity grinding to a halt quite like the inability to quickly open your documents, share information with other departments, or copy numbers from a spreadsheet into an email. Blanket OTP systems are already widely unpopular with many employees, forcing them to break away from their tasks at random intervals to convince their suddenly suspicious email servers that they are, in fact, who they say they are.

60% of data breaches in 2020 were connected to or resulted from insiders

Somewhere between these two divergent business needs – for security and usability – there needs to be a better way.

Autonomous, integrated identity management

Thankfully, it’s not just the attackers who’ve been getting increasingly sophisticated. As businesses shift to the cloud, building larger, more complex data landscapes, security technology is evolving to match. Businesses need to take advantage of these developments to create a Zero Trust environment, starting by protecting threats on the inside and working outwards, rather than vice versa.

Through intelligent, autonomous technology, businesses can implement systems that analyse far more than just a password or one-time code to determine whether a particular user gets access to a particular system. As cloud moves security closer to the user, IP addresses, past behaviour, endpoint ID, even geolocation and the time of day – all these data points can be gathered and analysed by an intelligent identity-as-a-service platform, and then used to decide on the spot whether an access request should be granted.

If for example, a mid-level sales executive from Basingstoke suddenly inputs their password from a township in Belize at two o’clock in the morning and tries to access the finance team’s file server – the system will spot the risk and lock them out until checks can be undertaken. That’s an extreme example, but an advanced, autonomous identity system can carry out thousands of these checks simultaneously, identifying and isolating much more subtle risks at speed.

That’s not to say that passwords and multi-factor authentication should be ditched altogether. Belt and braces is always the best policy when it comes to data security. To ensure they’re fully protected, companies should move controls closer to the user or device, reduce services delivered from DMZs and make sure users are segmented from the data centre network.

But it is to say that there’s a more nuanced, unobtrusive way to elevate security levels that doesn’t make employees feel like they’re constantly being locked out of essential systems. The key ability for businesses to invest in is autonomous, AI-backed detection and response. That way, if the business is logging all user and application layer activity, their systems will be able to rapidly integrate threat data from every possible entry point (not just end-user devices or emails) and take appropriate action faster than humanly possible.

As cloud-native business increasingly becomes the norm, anything less is undeniably a risk. Either to employees’ productivity – or to organisations’ data, reputation, and business viability.

Related Articles
Cloud Security Top trends in cybersecurity 2022: Vendor consolidation
Cloud Security Empowering the people
Empowering the people

Critical cyber security challenges.

Cloud Security Will the mid-market be left behind the cyber security curve?
Cloud Security Data in the cloud heightens the insider threat
Data in the cloud heightens the insider threat

The insider threat that caused the security vs usability conundrum.

Cloud Security Lighten your cybersecurity load
Lighten your cybersecurity load

How a consolidated approach works.

Cloud Security Platform perspective for the mid-market
Platform perspective for the mid-market

Key insights and recommendations from Gartner.

Cyber Security Why security portfolios will fail as platforms prevail
Managed Security Services Technology leaders' guide to SASE
Technology leaders' guide to SASE

The what, why and how of SASE

Cyber Security Red alert for cybersecurity
Red alert for cybersecurity

5 steps for defence

Cyber Security Cyber Security ABCDs
Cyber Security ABCDs

What they are and how to get them right

Cyber Security 7 cybersecurity challenges facing financial institutions
Managed Security Services Protecting the mid-market against ransomware
Protecting the mid-market against ransomware

"The biggest cyber threat facing the UK"

[Video] Plan smart: The future is SASE
[Video] Plan smart: The future is SASE

The perimeter is no longer “entombed in a box”

Cloud Security Censornet Platform Data Sheet
Censornet Platform Data Sheet

Freedom. Visibility. Protection.

Cloud Security Slam the door shut on cyber attacks
Slam the door shut on cyber attacks

with this all-in-one solution

⚠️ The UK Mid-Market on Code Red
⚠️ The UK Mid-Market on Code Red

The state of the UK’s cyber security response

Cloud Security Ten steps to prepare for SASE adoption
eBook
eBook

Zero Trust and Beyond

Cloud Security Webcast: Human Security and Risk Management
Webcast: Human Security and Risk Management

How to protect your users with email security

Uncovering 0365’s Security Blind Spots
The Impact of Remote Working
Zero Trust, Maximum Security
Cloud Security Russia Arrests 14 members of Top Ransomware Gang in the World
Cloud Security CISOs:  Top 5 Concerns in 2022
Cloud Security Ukraine’s Digital Minister forms Social Media Army
Cloud Security Autonomous Cyber Security
Autonomous Cyber Security

Easing alert fatigue

Cloud Security Fortify the New Perimeter
Fortify the New Perimeter

Protect your data in the cloud

Cloud Security The Dangers of Ignoring Cyber Security Needs
Cloud Security Is Cyber Security Complexity
Is Cyber Security Complexity

Threatening your business?

Cloud Security Hacking is a 24-hour business
Hacking is a 24-hour business

9-5 attention no longer cuts it

Cloud Security Mid-Market's future
Mid-Market's future

If it's left behind the cybersecurity curve

Cloud Security Fortifying the New Perimeter
Fortifying the New Perimeter

Protect your data in the cloud

Share this story

To find out more about data in the cloud, please contact one of our specialists

Rate the Article

Click the link below to rate this article

Rate this article

Here’s a single security platform that seems to provide all you need to protect your business from cyber attack and, refreshingly, they don’t put it all down to AI.

Learn More

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch