Lessons from the Transnet cyberattack
Lessons from the Transnet cyberattack
The recent cyberattack on Transnet has paralysed South African ports; this is how you can prevent a similar attack on your company.
According to the Ponemon Instituteโs global study of insider threats, almost one in four internal compromised data incidents in 2020 were caused by criminal and malicious insiders. Given the increased number of employees working remotely due to the global pandemic, business owners must stay alert to avoid potential risks.
โEmployee data theft is a difficult attack to defend the organisation against because it comes from the employees you trust, so it always hits unexpectedly,โ explains Oliver Noble, a cybersecurity expert at NordLocker, a data encryption solution. โAlthough you canโt predict them, understanding why and how employee data thefts are carried out might help you prepare better.โ
Why might employees want to steal your organisationโs data?
Most internal actors are financially motivated, as they try to cash in on the information they steal. Also, an employee might hold a grudge against their employer and steal data out of spite or revenge. Finally, there are those who embezzle whatโs confidential to start a competing business or benefit their future employer. Unknowingly, you may also have hired an inside agent acting on behalf of some external party that may be your closest competitor.
โWhatever their reason might be, malicious insiders are a ticking bomb once theyโre given trusted access to the organisationโs resources,โ says Noble. โThey know how valuable and critical the information your company handles is, and they are on the mission to steal or leak it.โ
What ways are used to steal information?
A new report found that 35% of corporate data leaks include photographs or screenshots taken by insiders. In 13% of cases, wrongdoers make physical copies of documents, whereas 30% of leaks occur through instant messaging, email or social networks.
Moreover, an employee can infect your companyโs computers with malware that may sit there undetected for days or even months before starting damaging your systems or leaking information.
โEvery solid business has information of value which may be attractive to other parties, like customer databases, client contracts and confidential project schemes,โ Noble points out. โTo get it, malicious insiders would do anything, even if it takes them long months of studying your systems and observing their colleagues. Thus, every respected organisation should have some data theft prevention in place to eliminate potential risks as much as possible.โ
How can you avoid malicious inside jobs?
Even though it is impossible to completely prevent inside jobs, as you might not be aware that malicious insiders are plotting something, these measures may help mitigate the risks:
- Establish the Principle of Least Privilege. It limits who has access to your critical data depending on employeesโ roles and functions.
- Implement an intrusion prevention system. It analyses real-time traffic and packet logging to help you detect and respond to any suspicious network traffic flows.
- Store data backups in an encrypted cloud like NordLocker in case ransomware hits. This ensures the data doesnโt get leaked and access to it isnโt lost.
- Get data loss prevention software. It detects potential data breaches, information exfiltration and destruction. The solution monitors, detects and blocks sensitive data while in use, in motion and at rest.
- Install digital signatures to sign every critical action within your organisationโs systems, with a secure mark of authenticity, so itโs easier to find the culprit if an incident occurs.
Published by
Focus on Transport
focusmagsa
