With 2014 sometimes called “The Year of the Breach,” many organizations have realized their most serious security threat isn’t the external attack. Instead, it’s the user who can compromise or leak the organization’s most sensitive data — its “crown jewels” — either intentionally or accidentally. According to IBM’s “2014 Cyber Security Intelligence Index,” 95 percent of all security incidents involve human error or a breached identity.

The issue becomes more difficult to deal with as the definition of “insider” moves beyond employees and privileged IT staff to include business partners, suppliers and contractors who may have inappropriate or outdated access rights, as well as third-party service providers with excessive administrative privileges. If not properly controlled, these users have the opportunity to cause security breaches.

The Role of User Awareness

Unfortunately, there’s no one silver bullet to solve the problem, but there are a number of actions organizations can take. Most experts agree that organizations should use a multipronged approach of user education, strong internal security policies and identity management solutions that extend across an enterprise’s operations, including supply chains and partners.

User education can help ensure staff members are aware of their accountability for particular activities, such as sharing passwords. However, despite improved awareness, some users are still going to be careless in their behavior and become victims of social engineering. Technology and restrictions need to be in place to protect users from themselves and the unavoidable tendencies of some to share company documents, peek at confidential data or click on links to cat videos sent in a phishing email.

Mitigating Insider Threats With Identity and Access Management

Identity and access management solutions can help address the problem of both negligent and malicious activity. All user groups with internal access to business systems should be certified and monitored, and each user’s access to corporate data should be mapped to align with their job requirements and responsibilities. Make sure access privileges align with established security policies and are backed up by auditing tools to monitor and report on user behavior. They can also help control policy violations and identify abuse that could signal an insider threat.

The privileged identity, with its unfettered access to IT resources and ability to delete traces of its activities, remains a big concern. If a privileged identity is not properly managed, it can cause security vulnerabilities and compliance issues and increase the risk of data theft. Consider privileged identity management solutions that control and monitor access of “super users” while providing individual user accountability.

When integrated with identity and access management, a security intelligence solution can produce user analytics and highlight anomalies, enabling organizations to do the following:

  • Establish a baseline for user behavior and quickly detect anomalies;
  • Create alerts when anomalous behavior is observed;
  • Correlate identities with known threats or suspicious IP addresses;
  • Protect against insider fraud by highlighting compromised employee accounts.

With the right security solutions, organizations can strengthen their identity management to minimize insider threats and improve compliance.

more from Identity & Access

Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments

While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the migration and introduced innovations of their own to exploit the platforms. Most of these exploits are based on poor configurations and human error. New IBM Security X-Force data reveals that…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be…