Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Protect Your Network From Internal Threats

b2ap3_thumbnail_user_error_400.jpgA business generally focuses on protecting their network infrastructure from external threats that are found in the online environment. However, it’s important to ensure that your organization's network is protected from not just external threats, but any insider threats that could more easily compromise the security of your data.

What is an Insider Threat?
Identifying an insider threat is one of the crucial first steps that must be taken, but it’s easier said than done in some cases. For example, an irritated former employee might try to infiltrate your network and steal a bunch of data, but it’s another thing entirely for someone to unknowingly give up account access information to a phishing scheme. Here are three instances that you should be aware of when identifying internal threats.

  • Angry former employees: Have you ever been in a situation when you’ve had a fired-up employee walk out of the office in a fit of rage? If so, it’s a possibility that their anger will turn into a lust for swift and terrible vengeance, especially if the employee has access to passwords, usernames, and other account login credentials. Former employees can either attempt sabotage themselves, sell credentials to hackers, or use them to get in with your competitors.
  • Sketchy co-workers: One key component of an internal threat comes from the physical theft of devices, equipment, or data. You might suspect someone is responsible if it’s been going on long enough. These thieves will usually steal devices and data in an attempt to make a quick buck and lash out at your business.
  • End-user error: In the previous two cases, data is leaked or lost because employees are trying to stab you in the back. In the case of end-user error, the problem is that your employees could be unknowingly handing over data to hackers posing as your IT department or a trusted vendor. These scams are often fairly obvious, but other times they can be convincing enough to make these hackers look like the real deal.

What Can You Do About It?
Knowing the enemy is only half of the battle, especially when it comes to dealing with issues that stem from human error. Follow this short action plan to keep internal threats at a minimum.

  • Set up an office security system: Security cameras and other systems aren’t unheard of in the business environment; in fact, they’re relatively commonplace. Organizations, particularly small businesses, have so much to lose from an office theft, so it’s important that you take advantage of this before you learn the hard way.
  • Keep a close eye on your network access logs: Besides the fact that it’s always a good idea to keep up with what’s happening on your network, monitoring your access logs is a good way to see who’s sneaking around and accessing data that they shouldn’t be. It can also help ensure that someone accessing your network from the other side of the world isn’t snooping around, either. Hackers who use legitimate credentials to infiltrate systems are increasing in popularity, so it’s important to keep a close watch on who logs in, and from where.
  • Perform exit interviews: When someone leaves your business, you should implement a thorough process to distinguish whether they own company devices or data, and respond to any concerns you or they might have about their departure. It also gives you a chance to address problems before they become serious issues later on. If someone is fired for seemingly no reason, they will grow bitter, and if they have sensitive information, it’s perfectly reasonable to assume that they will use this information to get back at you. Be sure that any credentials and accounts are quickly taken care of, because the biggest risk comes from employees who still have access to their work accounts.

Protecting your business from insider threats and external threats alike can be exhausting. In order to get the most out of your security solutions, and to find out more about how you can keep your organization safe, give us a call at (215) 853-2266.