3 minute read
Managing the insider risk is extremely complicated
employees require access to sensitive information, but heavy-handed approaches using complicated and static rules can frustrate users. This hampers productivity and leads users to search for workarounds that can also put data at risk.
Advertisement
Employees, contractors, and partners understandably have concerns about what activity is monitored. They have questions about what data may be in scope or out of scope. More importantly, users may wonder how these monitoring systems may be biased against them and intrude on their personal privacy.
There’s one consistent and prevalent security gap in every digital enterprise in the world. Regardless of the industry, whether it’s financial, healthcare or logistics, the common denominator remains the same: the human element. THE RISK FROM MALICIOUS INSIDERS HAS LONG BEEN A PRIORITY FOR CISOS AND HAS NOW BECOME A TOP PRIORITY FOR OTHER TOP EXECUTIVES AND BOARD MEMBERS.
Addressing the insider risk is extremely complicated. A recent DTEX report compares two distinct approaches: Insider Risk Management and Insider Threat Surveillance. The approaches share common goals of preventing data loss, detecting insider threats, accelerating incident response, and maintaining compliance.
Insider Risk Management (IRM) views the employee as a source of intelligence rather than a subject of surveillance. It effectively flips a model of invasive monitoring to one that anonymises user intelligence and collects only the minimum amount of metadata necessary to build a forensic audit trail, with full respect for an employee’s fundamental right to privacy.
File scanning, email, web, messaging application content capture, keystroke logging, and screen recording are not necessary for effective security with a metadata collection model. IRM goes beyond compliance requirements, prioritising employee privacy, while still enabling worker productivity.
Insider Threat Surveillance technologies have not only employed invasive content inspection, keystroke logging, and video capture capabilities but also often collect more data than necessary for their stated purpose. This creates unnecessary employee privacy issues, as well as significant costs associated with excess data storage and processing.
In some countries it may be illegal to monitor employees (or to use evidence from monitoring) to reprimand or dismiss an employee unless an Acceptable Use Policy has been well communicated to staff. In countries with well-established data protection laws, organisations must provide information about the processing of personal data, including what type of data is collected, who has access to the data, and under what circumstances monitoring may occur.
J2
J2 is a security focused African technology business founded in 2006 to address the need for effective cybersecurity, governance, risk and compliance solutions in Africa. J2 delivers essential tools that empower organisations to take control of their technology spend. The company’s hand-picked solutions provide complete visibility over its customers’ environment, while reducing risk and lowering costs.
www.j2.co.za
Businesses need to adapt quickly to changing customer requirements and competitive pressure and this requires an insider risk solution that takes the best strategies from a variety of approaches.
This could include rules from data loss prevention for known bad behaviour, machine learning, and behaviour analytics based on better data to identify malicious intent, and a privacy-first approach to employee monitoring that protects employees and is used in a proportional manner.
According to Gartner, surveillance of employee activities is not without risk. Organisations commonly monitor internal communications systems (for example, email or collaboration platforms) and investigate suspected policy violations. But expansion of these activities into a more pervasive inspection of the work life of employees can infringe on employee privacy expectations and rights in the workplace.
Download the Insider Risk Management and Insider Threat Surveillance e-book to learn more about the tools available and how workforce cyber intelligence and security can help.
Gartner says before organisations explore the use of insider threat tool and services, they must consult legal counsel and human resources leaders, and set boundaries on the capture, storage, sharing, analysis and destruction of data regarding employee activities.
BY JOHN MC LOUGHLIN, CYBERSECURITY EXPERT AND J2 CEO