Here’s a question for you: What threat do you consider the greatest risk to your data’s security? Malware? A distributed denial-of-service (DDoS) attack?

Would you believe the answer should be your own users? That’s right: According to the “IBM 2015 Cyber Security Intelligence Index,” over half of data breaches are caused by insiders, including employees, third-party contractors and partners — basically anyone who can access your organizational assets. Insider threats are a clear and present danger in today’s open enterprise.

Not surprisingly, the most damaging breaches are caused by malicious insiders with criminal intent, especially privileged users who can view and steal an organization’s most sensitive information, usually without detection. However, the IBM study pointed out that over 95 percent of insider threats are caused by human error. Examples include mishandling of confidential information, falling for a spear phishing campaign or having inappropriate access to protected data and applications. These risks can be often be mitigated through stricter policy controls and improved user education, but stronger and smarter security solutions are also required.

Michelle Alvarez, a threat researcher and editor for IBM Managed Security Services, has written the thought-provoking report “Battling Security Threats From Within Your Organization,” which delves into the reality of insider threats and what you can do about it. The report discusses the methods and motivations behind insider breaches, as well as a number of solutions and best practices that can help minimize the risk.

For example, products that monitor user behavior and provide anomaly detection are vital to identifying misuse and suspicious activities. Focusing on access management and, more specifically, privileged identity management (PIM) is an important step toward preventing internal data breaches and maintaining control over users. The paper provides recommendations and mitigation techniques you can use to thwart insider threats and minimize the damage they cause.

Want to learn more? Watch the informative on-demand webinar titled “The Danger Within: How to Win Against Insider Threats.” in which Michelle discusses her research findings and the implications for your organization. Robin Cohan, a product manager with IBM Security Identity Management products, explains how a privileged identity manager can arm you against insider threats. You’ll gain fresh insight into how to better protect your sensitive data from security breaches while still allowing users to access the resources they need to get the job done.

Read the full research report: Battling Security Threats From Within Your Organization

More from Identity & Access

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as "teapotuberhacker" (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website Gamers got an unsanctioned sneak peek of game footage, characters, plot points and other critical details. It was a game developer's worst nightmare. In addition, the malicious actor claimed responsibility for a…