Even the best intended workers can open the enterprise network to interlopers The U.S. presidential campaign was roiled continuously by leaks of emails from the Democratic National Committee and the chairman of that party's presidential campaign. After it was revealed that those actions resulted from email phishing attacks, many CSOs may well have empathized. But when, in early May 2017, a sophisticated phishing scam enticed perhaps a million users or more to click on a Google Docs link, that empathy might have morphed into a state of high anxiety. These events demonstrate that even well-meaning computer users can be lured into risky online behavior. The Google Docs cyber-attack relied on email delivered to inboxes that appeared to have been sent by a known and trusted contact. Many enterprises use Google resources for parts of their own infrastructure, and even those that don't may have many employees with their own accounts for Gmail, Google Docs, and other services. Even the best intended workers can open the enterprise network to interlopers, while some legitimate users may exploit their authorized access to execute malicious activities. Insider threats It may well be that the actions of insiders are a greater threat than those of outsiders. An analysis of cyber-breach claims data by Willis Towers Watson, a global multinational risk management, insurance brokerage, and advisory company, reveals that 66% of cyber-breaches are a result of employee negligence or malicious acts, compared to 18% directly driven by an external threat, and 2% from cyber-extortion. So it makes sense to take note of common employee behaviors that put your company at risk: Employees' devices can quickly be infected by malware when they click on a link or proactively visit a website poised to deliver a sliver of malware that can explode into a full-blown attack. Without their knowledge, their systems are subsequently being controlled by someone who’s taking days, weeks, or even months to find what’s worth stealing inside the enterprise network. Many employees let their guard down when using social media. An Intel Security survey of 2,000 UK respondents revealed that two-thirds had never wondered about whether a LinkedIn contact was authentic, and 24% had connected on that service with somebody they did not know. Not only does that make them susceptible to targeted attacks, but it also puts their companies at risk, as interlopers gain access to trusted circles and can target others within an enterprise. Workers can be na?ve, and negligent, about handling confidential information. IT solutions provider Softchoice surveyed 1,500 North American workers and found that one in five employees keep passwords in plain sight, such as on Post-It notes. One in three cloud app users have downloaded an app without letting their IT department know, according to the Softchoice survey. Almost three-fourths of employees say they would share sensitive, confidential, or regulated company information under certain circumstances, according to the Dell End-User Security Survey 2017. Those circumstances range from being directed to do so to believing the risk is low. But for the most part the employee is making a judgement call that it is OK to do so. Only by automating the detection of attacks and risky behaviors inside an organization can IT security stand a chance. As the new dimension of complementary attack detection, User and Entity Behavior Analytics (UEBA) is a fast-emerging technology that utilizes machine learning techniques to detect anomalous behaviors and reliably attribute malicious intent to them. To learn more, visit Aruba. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe