There is no getting away from the fact that insider threats are a very real risk for companies. While malicious threats from disgruntled employees exfiltrating data and selling it do happen, by far the biggest insider threat comes from employee and contractor negligence. A survey conducted by IDC on behalf of SolarWinds found that over 60% of respondents said insider mistakes were their biggest threat. Ponemon’s Insider Threat Statistics showed that accidental insider threats cost roughly $283,000 per incident; due to their frequency, these incidents wrack up around $3.8 million per year.
Elsewhere, a Crowd Research Partners survey found that privileged users are the biggest source of concern for organizations. Fifty-five percent of companies responding cited this as their biggest insider threat risk. Many high-profile breaches happen as a direct result of inadequate management of privilege access and unintentionally exposed administrative credentials.
As a managed services provider (MSP) this is definitely an area you need to be focusing on with your customers. Here are five tips to help you help your customers reduce the insider threat risk.
1/ Educate Your Potential Customers
As a service provider, you’ll likely run into customers with a varying level of understanding about the potential of insider threats. Some may completely understand the risk, while others may naturally trust their employees (especially if they passed a basic background check).
Due to this, it’s important to get your customers on the same page about the potential risks of an insider attack. Start that communication early during the sales process. Make sure to put information in your sales pitch about protecting against insider threats, and why it’s so important. You may consider making an insider threat prevention program a non-negotiable service as part of the deal, and walk away from customers who don’t see the need. Ultimately, it’s not just their reputation on the line after a breach—it’s yours as well.
2/ Implement Strong HR Policies
You can’t fully control this element, but your customers’ HR policies can make a huge difference in reducing their insider attack risk. Your job is to persuade them to take these policies seriously.
For starters, they should perform background checks on new hires. Hopefully, they do this already, but make sure to stress the importance of this before they hire someone. Next, they should have a plan in place for employee turnover. When an employee leaves, they should be required to hand over all equipment and keys, and the customer should communicate their departure to you promptly so you can revoke access to important accounts or data. While many employees leave amicably, it only takes one disgruntled former employee to wreck a company’s reputation. Don’t let them take that risk.
3/ Zero Trust
When you start to focus on securing your customers’ networks against insider threats, make sure to implement and police a zero-trust identity policy. The zero-trust identity model claims that access to resources and systems should be denied by default. Only when users meet certain characteristics will they be granted access to specific systems or resources, and only for a limited period of time.
For example, let’s say someone needs to access the accounting database for one of your clients. You could set up the environment so it checks that the user has the proper role in the accounting department, is using a known computer, and is doing so from a known, safe location. If one of those attributes doesn’t check out, the system could prompt the user for more information, such as a temporary code sent via text or email.
4/ Identity Management
Another important part of this plan involves implementing strong identity management and implementing least privilege. When setting up user accounts for your customers, make sure they can access only the data and resources they absolutely need for their jobs. Any additional privileges they have represent considerable risks to the business.
When you first take on a new client, audit their existing users and permissions to make sure no one has more privileges than they need. You may be surprised how often one user ends up with administrator privileges on key systems simply because no one enforced access controls as the company grew. Once you have this audit in place, work on reducing access rights to the minimum needed for employees to do their jobs.
However, this goes beyond initial setup. You have to actively manage user permissions and access. If someone moves departments, you should revoke access to their old systems. For example, if someone from the human resources department switches career paths and joins the marketing team, it would be risky for them to still be able to access sensitive employee information. Remember, if someone doesn’t need access to a resource to do their job, don’t let them.
5/ RMM Checks
Finally, in today’s ever-changing threat landscape, anything that can help you get ahead of the game is hugely important. This is where your existing technology comes into play. Some remote monitoring and management solutions, like SolarWinds® RMM, allow you to create checks to indicate a potential threat.
For example, SolarWinds RMM would let you set up a check for changes to Active Directory that could indicate someone attempting to modify permissions. Or you could set up a check looking for mass file deletions, which could indicate someone attempting to damage important, business-critical information. If your RMM tool alerts you to something like this, then you can respond accordingly.
Unfortunately, employees can and do cause data breaches. As an MSP, you’re responsible for preventing these. So make sure to implement the right steps.
Remember, a well-maintained environment is a secure one.
By Marco Muto, Director, Business Development at SolarWind
To find out how the SolarWinds security suite can help you protect your customers, click here