Page 263 - Cyber Defense eMagazine August 2024
P. 263

Negligent insiders generally act unintentionally, driven by carelessness or apathy. However, they are still
            responsible  for their actions. Inadvertent  insiders accidentally  cause damage, whether by mistyping an
            email address, becoming a victim of phishing or using a device that behaves unexpectedly.

            To be clear, an insider’s intentions don’t matter much when the result is the same. The distinction exists
            simply to guide disciplinary action and post-incident analysis. That may be why 30% of chief information
            security  officers agreed  this threat  was their organization’s  most significant  cybersecurity  risk in 2023,
            according to one global survey.

            Unlike  cybercriminals  or  disreputable  competitors,  internal  threats  don’t  stand  out.  Since  they  have
            legitimate access, conventional monitoring tools and security measures won’t flag their activity. Moreover,
            since  they personally  know their  colleagues,  they often  don’t  seem immediately  suspicious  — even  if
            indicators suggest they are.

            Crucially, insider supply chain threats pose an even more significant danger because they have disparate
            data  systems,  operate  with  less  oversight  and  have  different  security  protocols.  Even under  contract,
            these vendors may feel they can get away with taking shortcuts or being inattentive of cybersecurity —
            and businesses will likely be blissfully unaware until it’s too late.



            Strategies to Defend Against Insider Supply Chain Threats


            Several strategies to defend against insider supply chain threats exist.

               1.  Monitor Third-Party Vendors

            Monitoring is critical to mitigating insider threats. After all, information technology (IT) teams can’t address
            what  they  don’t  see.  Recently,  real-time  visibility  has  become  fundamental  for  developing  a  resilient
            supply chain. In fact, most companies are seeking to invest in such solutions within the next few years.

            Decision-makers  should  consider  this  surge  in  interest  a  sign  to  begin  monitoring  their  supply-chain
            vendors.  Whether  they  decide  on  periodic  audits,  sentiment  analysis  software  or  radiofrequency
            identification  tag  tracking,  increased  oversight  will  help  them  identify  and  eliminate  all  but  the  most
            sophisticated insiders.

               2.  Develop a Mitigation Budget

            Even  though  negligent  insiders  cause  60%  of  data  breaches,  only  8%  of  a  company’s  cybersecurity
            budget goes toward managing them. Developing a mitigation budget for this issue ensures the IT team
            has enough resources to address vendors in addition to their regular responsibilities.

               3.  Conduct Risk Assessments

            How do senior executives know which third party to trust? Conducting risk assessments for supply-chain
            vendors  removes  the  guesswork.  It  determines  their  likelihood  of  employing  an  individual  who  is  a
            malicious, negligent or accidental internal threat. This method is simple and effective, making it ideal for
            time-sensitive situations or IT teams with large workloads.





            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          263
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   258   259   260   261   262   263   264   265   266   267   268