In recent years, remote work has become a growing trend. In 2018, however, only 3.6 percent of Americans worked entirely remotely. Due to changes in the global climate, many employers have shifted their workforces to remote work if their jobs can support it. With the sudden expansion of work-from-home and remote-work practices, chief information security officers (CISOs) need to adjust their security programs to cope with the rapid shift in the IT estate away from the corporate network.

What was once a small percentage of the workforce is now much more significant, and security teams need to make adjustments to their controls to adapt to this new way of working. We’ve recently explored how security teams can enable remote workers to collaborate securely, but another area to consider is how to extend the reach of the security operations center (SOC) to cover endpoints outside of the traditional perimeter.

Intercept Threats at the Perimeter

To effectively secure remote employees, teams must better understand their distinct behavior and its implications in insider threat detection. CISOs must be able to answer the following questions:

  • How can you verify the person logging into the corporate virtual private network (VPN) is the employee, not an attacker using stolen credentials?
  • How can you verify an employee’s anomalous behavior isn’t a result of working remotely?
  • How can you help secure employees connecting to open and unsecured internet locations, such as coffee shops?

By better understanding the behaviors of remote workers, teams can focus on detecting anomalous behavior that could signal credential compromise or malicious intent. These behaviors can often be detected at the VPN boundary before potential damage can be done. On the perimeter, CISOs should determine if their current insider threat capabilities enable them to:

  • Get the appropriate visibility into access, authentication and VPN logs
  • Determine if employee credentials are being used in two places simultaneously or from a different geography than is normal
  • Identify if credentials are being used outside of normal working hours for the city of the primary employee location, or if the duration of connection is longer than normal
  • Terminate the connection, block the device and revoke credentials via identity and access management (IAM)

Recognize Threats Within the Network

If an attacker manages to evade detection at the perimeter and is inside the organization’s network, security teams should validate the threat by looking for a number of indicators of compromise or abuse. These can be derived from a number of methods, including machine learning, that can help determine if the access is from a legitimate employee or a credential thief. Within the organization’s network, CISOs should determine whether their current insider threat capabilities enable them to:

  • Model normal activity patterns and frequency of distinct activities to detect deviation from the baseline. A deviation can be an indicator of abuse, whether intentional or accidental.
  • Monitor data exfiltration attempts by the number of outbound communication attempts or connections by an employee in a given day. If an employee has a spike in the number of outbound communications, it may be an indication to monitor that user’s credentials closely.
  • Identify large volumes of data being transferred on the network that would be abnormal for a given employee. Monitoring the aggregate data transfer can offer a level of simplicity and can be a powerful early indicator of compromise.
  • Inspect the integrity of endpoints for suspicious applications that may indicate malware activity. By identifying new processes or application execution, you can contain and reduce risk to the rest of the enterprise.

If security teams are proactive in adjusting their programs to compensate for the shift in employee behavior, they will be better equipped to keep the enterprise secure by maximizing their existing tool investments. Learn more about how to augment investments in security information and event management (SIEM) with behavioral analytics to protect your organization from insider threats.

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today