Insider attacks are becoming more and more popular and difficult to detect
Perhaps just hearing through the name, we can somehow imagine that this form of cyber attack is directly related to people working in the targeted network, for example. As a certain IT (IT) employee feels "dissatisfied" with his boss, he decides to "knock down" the network of the company where he is working. Attacks on the internal network can be harmful or harmless depending on the purpose and level of the attacker. Typically, internal attacks often involve acts such as deliberately eavesdropping, stealing or destroying information, fraudulently using information or unauthorized access to an important data warehouse.
- [Infographic] How to recognize and prevent Phishing attacks
Internal attacks are becoming more and more popular in recent years. According to Bitglass, 73% of the surveyed IT experts said that their companies often face internal attacks. While 59% were asked to declare that the systems they managed also experienced at least one incident involving internal attacks in the past 2018.
Cloud Access Security Brokerage Company (CASB) Bitlass has obtained these results after conducting a large-scale survey with the participation of 437 IT professionals, and cooperating with Cybersecurity community. Insiders includes more than 400,000 other information security experts worldwide.
While in reality, most organizations and businesses are aware of the dangers from the threats initiated by malicious agents outside their systems, Bitglass also recognizes that there are quite a large proportion of organizations, this business absolutely does not notice that it is equally important to make countermeasures to discover and prevent the threat of insider attacks. .
- New ransomware detection not only encrypts files but also helps 'clean up' the system
The fact that 68% of IT professionals surveyed said that their organizations are in the range from moderate to extremely vulnerable to threats from inside is evidence of the importance of It is extremely urgent for all organizations and businesses to build and establish defensive security measures to deal with internal attacks.
"In fact, internal attacks are often more difficult to identify and fix than external attacks. This is because internal attacks are often caused. by a number of factors existing in many network systems, including inadequate authentication capabilities, inadequate user behavior monitoring on cloud platforms, and lack of proper security settings for devices If individuals want to prevent internal attacks, they must first solve the problems mentioned above, 'said Rich Campagna, CMO of Bitglass.
In general, internal attacks are often particularly dangerous because they are more difficult to detect than attacks coming from outside sources, because of the fact that internal security controls in the corporate network careers are often less respected, and this contributes to the conditions for 'insiders' to attack the system they are working on.
- The alarming increase in the number of attacks targeted at IoT devices
Besides, the problem got worse when reporting on Bitglass's internal threat in 2019 also found that "only 50% of the surveyed organizations provide security training. for users and their employees about possible threats to the internal system, and only 31% implement secondary authentication to protect their systems. '
In addition, 56% of the experts interviewed said that internal threats were often detected in their organizations during the day, while 50% stated that the recovery of the consequences after the attack was also will be done and completed at the end of the day after the attack.
- Endpoint Detection and Response threats, an emerging security technology
41% of respondents said that Cloud migration is considered one of the leading factors making internal attacks even more difficult to detect and combat, especially When many organizations and businesses do not implement appropriate tools to monitor "unusual behavior of users on the cloud platform".
On the other hand, 56% of IT professionals interviewed by Bitglass claim that internal threats will become harder to detect when an organization moves its IT infrastructure to the cloud, as well as move between multiple cloud platforms.
- What is cybercrime? How to prevent cybercrime?
In addition, when asked by Bitglass whether his company can detect internal threats stemming from personal mobile devices, only 12% of respondents said they are currently own the tools and knowledge needed to do that.
The final and equally important data, that is, 56% of endpoint devices in general, and 46% of mobile devices in particular are the 2 most commonly used devices in launching attacks. internal work.
You should read it
- The 3 most popular attacks targeting clouds today
- Top 5 trends in endpoint security for 2018
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps
- The basic steps in dealing with network security issues that you need to understand
- What do you know about the first 'cyber attack' in the world?
- What is a Sybil Attack?
- What is 51% attack? How does 51% attack work?
- Vietnamnet is hacked with internal signs
May be interested
- Excel continues to be used as a lure for online fraud with complex mechanismsthe popular tools and software used by microsoft have become the target of hackers to deploy online attacks many times.
- DNS attacks are costing governments worldwide huge amountsgovernment organizations in each country suffer an average of 12 dns attacks per year.
- Windows 10 Troubleshooter has the ability to scan and detect errors automaticallythe latest build of windows 10 redstone 6 in windows insider program has revealed new features of the troubleshooter fix tool, promising to automatically help solve computer problems.
- How to handle and escape when the dog attackswhat to do when a dog attacks? this is a difficult answer because when a dog attacks, most people are in a state of panic and cannot control themselves, leading to a bad situation.
- FBI agent shared 8 ways to detect liarsgreat way to detect extremely liar.
- Science reveals 5 simple ways of detecting lieswith 5 ways to be scientifically proven below, you can rely on expressions of words and expressions to detect a person who is lying. especially the last way can detect liars to 99% accurate.
- The new algorithm can prevent cyber-attacks on GPS devicesscientists have developed a new algorithm that can help detect and prevent cyberattacks on gps-enabled devices in real time.
- What to do if BIOS cannot detect ATA/SATA hard drive in Windows?it can be worrisome when the bios doesn't detect or recognize the ata/sata hard drive. worse yet, there are many causes of this problem, so it can be difficult to find the exact culprit that keeps the computer from detecting the hard drive.
- AI-based systems are designed to detect poachershunters often hunt at night, which is why infrared cameras mounted on unmanned aircraft are used to detect them. the problem is, because both poachers and animals emit heat, it is difficult to accurately identify.
- Microsoft warns of an increasing trend of attacks targeting firmware and worrying public indifferencethis is indeed a worrying 'lethargy', especially given the recent increase in the number of attacks targeting system software.