Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Database
    • Networking

    Enterprise Security Threats Increasingly Come from Within

    Written by

    Matt Hines
    Published March 22, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Enterprises searching for the answers to their security problems should increasingly take a closer look at their internal operations before blaming outside threats, according to experts participating in an online IT security conference.

      Speaking as part of Ziff Davis Media eSeminars Security Virtual Tradeshow, industry watchers conceded that applications such as e-mail clients, file-sharing systems and instant messaging platforms continue to pose serious problems for those people charged with protecting corporate IT networks and information.

      However, the collection of consultants, analysts and vendors participating in the event said that the issue of workers who purposefully or inadvertently ignore security policies has also proven to be one of the hardest obstacles to overcome in increasing corporate security.

      “Its a tough question to answer but one that must be dealt with,” said Howard A. Schmidt, a former chief security officer at Microsoft and one-time strategist for the U.S. Department of Homeland Security.

      /zimages/5/28571.gifClick here to read more about government agencies security practices.

      “Companies tend to hire people they think they can trust, so dealing with the issue of insider threats is a longtime debate; but its clear that disgruntled employees are as likely to attack networks as insiders, and then theres the more widespread issue of security policy negligence.”

      Despite having security policies in place to help protect against such internal problems, Schmidt said that most have very limited capacities for tracking down the cause of potential attacks or figuring out just which employees are bypassing security guidelines and putting corporate data at risk.

      A prime example of the sort of threat Schmidt is talking about can be found in many of the reported cases of consumer data theft that have been tied to stolen laptop computers, he said, because in many of those cases the sensitive customer information involved was not supposed to be on the devices in the first place.

      The industry expert, who currently serves as the chief executive of R & H Security Consulting LLC, even suggested that companies need to begin legally pursuing employees who endanger their companys security by breaching established policies.

      “[Enterprises] must hold people responsible when they do something wrong or something comes from their computer, they must have a way to effectively gather evidence and be willing to prosecute,” Schmidt said.

      “Companies also need to make sure that they have relationships with law enforcement; when something goes wrong, thats not the time to try and figure out who you need to speak with.”

      /zimages/5/84833.gifIs outsourcing e-mail security right for your organization? Ziff Davis Media eSeminars invites you to learn about the security and management challenges facing e-mail technology implementers and decision makers from Tumbleweed on March 28 at 2 p.m. ET.

      Other experts agreed that there is an ongoing shift toward tightening internal security within large companies based largely on executives fears of being the next firm highlighted in the news as having put its customers information at risk.

      Andres Kohn, vice president at security applications vendor Proofpoint, said that customers are more frequently citing widely publicized security breaches at other firms as their inspiration for investing in new technologies.

      Next Page: Workers mistakes.

      Workers Mistakes

      For the most part, said Kohn, his clients are scared more by the prospect of workers who mistakenly circumvent security policies, rather than people with some sort of ax to grind.

      “All kinds of sensitive information is being let out accidentally when people dont really understand what theyre doing, but thankfully this risk can be mitigated using technology,” said Kohn.

      “The top priority for many firms has become training, and some companies are more actively investigating the cause of issues and penalizing employees for their mistakes, and all of this can help improve the situation.”

      The experts said that the best way for companies to immediately improve their internal security controls is to thoroughly revisit corporate policies, and the manner in which guideline are conveyed to employees.

      Handing someone a thick stack of documents when theyre hired and expecting them to understand all the contents within isnt practical, the industry watchers said, so firms should be smarter in the ways they inform employees of what any rules may be.

      One way to do this is to make information security a more high-profile element of most workers responsibilities and to train people specifically on the potential security implications of their individual jobs.

      By making policies directly applicable to the tasks and IT tools that workers use every day, people are bound to become more aware of making potential mistakes, they said.

      /zimages/5/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      “The important questions are whether companies are using the right types of policies, and whether they have the right tools in place to ensure these are being effective,” said Kohn. “And security policy needs to be a living thing that changes as your business changes.”

      Researchers with PricewaterhouseCoopers detailed the findings of their most recent information security survey at the eSeminar, a study that involved interviews with more than 8,200 IT executives conducted during mid-2005.

      According to the report, only 37 percent of all companies interviewed had an overarching security strategy, while 24 percent said they were in the process of creating such a plan.

      Unsurprisingly, those firms who employed a chief security officer were far more likely to have completed the policy work, with 62 percent of those firms reporting that they have already established internal guidelines.

      While offering no statistical evidence to illustrate the point, PricewaterhouseCoopers said that those companies also had far fewer security breaches and less network downtime.

      “If you promote security to the [senior executive] level, theres proof that there are lower numbers of intrusions and other problems,” said Mark Lobel, a partner with PricewaterhouseCoopers.

      “What we found is that companies need to realize that its time to get proactive versus reactive, and link security strategy of the top levels of their businesses.”

      /zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.