Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Nepal protests
  • Nepal Protests Live
  • Vice-presidential elections
  • iPhone 17
  • IND vs PAK cricket
  • Israel-Hamas war
fp-logo
Framework Approach: Key To Tackle Insider Threat
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • Framework Approach: Key To Tackle Insider Threat

Framework Approach: Key To Tackle Insider Threat

FP Archives • February 2, 2017, 22:02:52 IST
Whatsapp Facebook Twitter

Internal security risks are only going to increase as business models evolve.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
On
Google
Prefer
Firstpost
Framework Approach: Key To Tackle Insider Threat

According to a recent RSA-sponsored IDC report, 52 percent of organisations have labelled incidents arising from insider threats as predominantly ‘unintentional’. The report also states that employees with laptops, smartphones, PDAs, multiple e-mail accounts and access to corporate systems can prove to be a major challenge to security. Mobility and access issues comprise a threat of much wider scope than the one posed by the miniscule percentage of insiders (about 1-3 percent), who commit intentional, malicious acts.

STORY CONTINUES BELOW THIS AD

The survey found that 43 percent of organisations have allocated a specific budget for internal security risks, and about 40 percent of organisations plan to upgrade the same over the next year, while 6 percent plan to decrease spending.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Certain instances have been reported in India too about data getting inadvertently exposed in the public domain. The website of VFS, an India-based visa processing outsourcing company, was found weak, when an Indian national was able to access confidential details of visa applicants by tweaking the URL. The other issue that caused much uproar in Indian enterprise circles was the Ministry of Home Affairs’ (MHA) proposal seeking a complete blackout of Blackberry services as they are vulnerable to espionage.

Unintentional slip of information by employees

For a very long time, insider threat was associated with employees, who had a malicious intent. However, of late, there has been a spurt of incidents where information has been exposed inadvertently or unintentionally by company employees. Organisational resources logging on to non-business websites is a common source of insider threat, where an employee visiting a loose website ultimately ends up compromising the company’s network. Various studies have shown that up to 80 percent of malware-infected websites belong to legitimate businesses. Thus, it is imperative for companies to adopt a ‘Defence-in-Depth’ strategy, which comprises multiple layers of security.

“Insider threats could be the malwares residing on various PCs of internal users, which may damage either the servers or peer PCs,” says Sameer Ratolikar, CISO, Bank of India. To counter this threat, he suggests the approach of integrating the people, processes and technology components of the business. “Anti-malware is always important, but more significantly, enterprises should implement an effective ‘Information Risk Management Framework’. This will ensure that the foundation for dealing with all such threats is strong and will help in building a good physical and logical access control system, in addition to firewalls and the NIPS (Network Intrusion Prevention System) that have the capability to prevent application attacks,” he says.

STORY CONTINUES BELOW THIS AD

Employee education and awareness about the organisation’s information security policies and the repercussions that could arise from non-adherence are also on the list of Ratolikar’s strategies to deal with insider threats.

DRM , DLP solutions to the rescue

Murli N, head-Security, Reliance Capital, says, “Users often store project-related information even after its completion. This leads to data back-up on servers without authorisation or sufficient security attached to it”. To overcome this, Murli’s company has put in place Documents Rights Management or DRM, which helps to classify data and secure it such that only ‘authorised’ users can access it based on granular access rights provided to them (edit, print, copy etc).

“We have also implemented a Data Loss Prevention (DLP) solution, which monitors the various channels (e-mail, http, ftp, data cards, USB/ CD and print) to identify if any corporate data is being sent out,” he says. However, DLP should be carefully adapted so that it doesn’t hamper collaboration.

STORY CONTINUES BELOW THIS AD

Vikas Desai, lead technology consultant, India & SAARC, RSA, is of the opinion that contractors and temporary staff represents the greatest insider risk to organisations. As a by-product of the recession and the slow recovery following it, many companies are increasing the use of contractors, temporary staff, and outsourcers. While not employees, they need access to corporate networks. This creates a burden for the IT staff, who are tasked with managing their access rights, monitoring their activities, and de-provisioning their accounts when their contracts expire, all the while still protecting sensitive information and meeting compliance norms.

There are many rights management technologies on the market like Seclore FileSecure that provide control of information, viz. viewing, editing, copying, forwarding and so on, based on defined policies. These policies could either be centrally defined or end-user defined. “These policies are implemented irrespective of the location (within or outside the enterprise) and therefore, collaboration is not affected,” says Vishal Gupta, CEO, Seclore Technology.

STORY CONTINUES BELOW THIS AD

“Typing wrong e-mail addresses or a laptop theft can also lead to major insider threats,” adds Gupta. Similarly, lack of awareness also leads to insider threat incidents where business users are not aware of the value/ confidentiality of the data they are dealing with and therefore, willingly share it with outsiders and thereby, make it public.

RSA suggests the use of internal risk guards for controlling information loss through lost laptops, USBs, PDAs, mobile phones and the like.

EMC, RSA’s holding company, has formed a Critical Incident Response Team (CIRT) to proactively manage the information security within the converged organisation. CIRT, a US-based operation, functions at three levels. Level 1 handles pre-defined events and documented procedures for analysis. Level 2 deals with pre-defined events and a more free-form analysis with documented guidelines. Level 3 conducts advanced R&D including threat identification, command and control identification and threat management that includes intelligence gathering, threat validation and impact analysis. With this kind of an internal set-up, EMC is able to proactively protect its information assets.

STORY CONTINUES BELOW THIS AD

The Final Word

Internal security risks are only going to increase as business models evolve with a dynamic mix of users and geographically-dispersed locations. In such a scenario, enterprises need to adopt a framework approach to the issue. Instead of just relying on DLP and such other solutions, it is imperative that the CIO community takes a holistic view and adopts a multi-pronged approach. Regular employee education on information security policies should be imparted. As enterprises tide over the recessionary wave, they may not have enough resources at hand to deploy new security solutions; however, nothing stops CIOs from dictating the effective implementation of policies already in place.

STORY CONTINUES BELOW THIS AD
Tags
Technology Security RSA EMC BizTech News Insider Threat
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Israel targets top Hamas leaders in Doha; Qatar, Iran condemn strike as violation of sovereignty

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Nepal: Oli to continue until new PM is sworn in, nation on edge as all branches of govt torched

Who is CP Radhakrishnan, India's next vice-president?

Who is CP Radhakrishnan, India's next vice-president?

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Israel informed US ahead of strikes on Hamas leaders in Doha, says White House

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV