George Foot

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat

Your biggest data security threat could be sitting next to you…

Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved.

But although more and more businesses are taking steps to improve data security, few are considering the most likely cause of such a threat: human error. According to our Voice of IT report, human error is perceived to be the biggest threat to an organisation’s IT security.

However, when looking within, there’s not one, but three personas to consider: careless employees, disgruntled employees, and uninformed employees.

Careless employees

failing mobile phones

(Image Source: Shutterstock)

Some of the biggest and most embarrassing data breaches have been from employees taking information out of an organisation and accidentally leaving that information in a public place. In 2008, a USB stick containing a list of passwords for a UK government computer system was found in a car park pub in Staffordshire. The following year, a health worker from Lancashire lost a memory stick containing the personal details of more than 6,000 current and ex-prisoners (while the data was encrypted, the password had been written on the back of the USB pen.) In 2010, an Apple engineer accidentally left a prototype for the not-yet-released 4th generation iPhone in a bar in California. These are just a few of the most famous examples of employees accidentally leaving confidential data in public places.

The lesson here is that companies need to think long and hard about the information they’re willing to allow employees to take out of the business premises. These days, as more and more employees access emails and corporate files from mobile devices, this is especially important. An unlocked smartphone that’s logged into a company system can be just as dangerous as a USB drive with all the information already downloaded onto it.

Disgruntled employees

shutterstock_63966280

Disgruntled employees arguably pose the biggest threat of all. Depending on the seniority of the employee, an employee may not only have access to sensitive company information and documents, but also to networks, admin accounts, and data centres.

According to some cyber experts, the extremely costly 2014 Sony Pictures hack was not an attack from North Korea but the result of a disgruntled employee. Whether or not that’s true is still up for debate, but the fact that Sony is willing to entertain it highlights the fact that some employees have too much power and given an opportunity could cause serious problems.

The Sony Pictures hack isn’t the first example of a disgruntled IT employee wreaking havoc. In 2008, Los Angeles city network admin Terry Childs reset the passwords for the city’s FibreWan network. Childs, a very disgruntled employee, then refused to hand over the passwords and brought the city into a state of digital lockdown for several days.

While obviously Childs is very much to blame here, human error is also to blame on the part of his superiors, who gave him too much freedom and responsibility. The lesson here is that no matter how important an employee is, they shouldn’t be given too much digital freedom, particularly when it comes to admin rights. The more administrators there are for different sections of the business, the less damaging an internal attack will be.

It’s also important to remember that most attacks by disgruntled employees happen after an employee has been laid off. This gives most companies ample time to reset important passwords and prevent an attack from a future disgruntled employee.

Uninformed employees

Data security isn't something that regularly crosses the minds of most employees.

In 2015, French TV station TV5Monde was taken off the air by hackers purporting to be a part of the Islamic State. TV5Monde’s website and social media accounts were both affected.

The following day, staff from TV5Monde were interviewed to discuss the attack in front of a wall which had several sheets of very sensitive company information stuck to it. According to several sources, the sheets of papers contained lists of the company’s social media accounts and passwords. Other footage from the interviews showed post-it notes on computers containing passwords for other important company accounts.

Ignoring the fact that some passwords were as simple as ‘youtubepassword’, the lesson here is to educate employees regularly on the importance of data security. While most employees won’t ever be interviewed on national television, there may be other ways that they could unwittingly share important company information. In the past social media, accident emails, accidental email attachments, and viruses have all resulted in sensitive company information being leaked outside of the company.

Therefore, proactivity is vital to the wellbeing of IT infrastructure. Along with training employees on best practice, some companies are investing in risk management software – combining big data analytics with an understanding of human behaviour – to identify internal threats before they strike.

Fear of the unknown is justified but, when it comes to security, the devil you know could be your biggest danger.

By George Foot

George Foot

Vice President Kensington Europe & Global Marketing

George has been a part of Kensington for over 10 years and now serves as the Vice President for Kensington Europe & Global Marketing. George has extensive experience within the consumer electronics industry and possesses a great passion for technology. He is responsible for setting the vision and strategy for the region, Go-To-Market delivery and sales performance.

View Website
ThreatMetrix Quarterly Fintech Cybercrime Report 2017

ThreatMetrix Quarterly Fintech Cybercrime Report 2017

Fintech Cybercrime Report 2017 ThreatMetrix has released its latest quarterly cybercrime report based on cybercrime attacks from October to December 2016, detailing trends across financial services and eCommerce, with a global study of traffic patterns ...
Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has arrived as a mainstream technology, with one prominent analyst firm (IDC) going so far as ...
Five Ways CPQ Is Revolutionizing Selling Today

Five Ways CPQ Is Revolutionizing Selling Today

CPQ Is Revolutionizing Selling Configure-Price-Quote (CPQ) continues to be one of the hottest enterprise apps today, fueled by the relentless need all companies have to increase sales while delivering customized orders profitably and accurately. Here ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put organizations around the world on high alert. Even those of us lucky enough not to ...
How Blockchain Has Unexpectedly Improved Big Data Integrity

How Blockchain Has Unexpectedly Improved Big Data Integrity

Big Data Integrity Blockchain technology was developed to improve the integrity of bitcoin. However, as bitcoin became more popular, its underlying technology is gaining more attention as well. Perhaps the most significant development in IT ...

CLOUDBUZZ NEWS

Kaspersky Lab to open Swiss data center to combat spying allegations

Kaspersky Lab to open Swiss data center to combat spying allegations

LONDON (Reuters) - Moscow-based Kaspersky Lab plans to open a data center in Switzerland by the end of next year to help address Western government concerns that Russia exploits its anti-virus software to spy on ...
Facebook suspends 200 apps over data misuse investigation

Facebook suspends 200 apps over data misuse investigation

(Reuters) - Facebook Inc has so far suspended around 200 apps in the first stage of its review into apps that had access to large quantities of user data, in a response to a scandal ...
Security in the Cloud—A Little Known Advantage, Actually

Security in the Cloud—A Little Known Advantage, Actually

Okay, I’ll go ahead and say it: Public cloud infrastructures are more secure, and the security is more cost-effective, than the majority of on-premises data centers. That should get the blood flowing. With the word ...
The Lighter Side Of The Cloud - The Dating Game
The Lighter Side Of The Cloud - Virtual Office Space
The Lighter Side Of The Cloud - Low Tech
The Lighter Side Of The Cloud - Security Overkill
The Lighter Side Of The Cloud - Snowball Effect
The Lighter Side Of The Cloud - YTF
The Lighter Side Of The Cloud - Fear Of Heights
CloudTweaks Comic
The Lighter Side of the Cloud - Procurement