Here are the five most common methods insiders use to access network resources and simple measures enterprise IT can take to protect against the implied threats.

While organisations are busy protecting themselves from an external threat of data theft and sabotage, many forget about internal threats. According to the latest Computer Security Institute report, insider threats are up 17 percent and those businesses that fall foul of such theft will find themselves surrounded by hard costs, compliance-related problems, legal fees, productivity loss and, possibly the most costly of all, loss of reputation.

However, as IT and communication systems grow in complexity, so to do the numbers of employees, contractors and managed service providers that have unmonitored access to maintain them.

It should be clear that companies need to monitor insiders as aggressively as they do outsiders. However, policing insiders can prove challenging given the privileged access they require to do their jobs. Here are the five most common methods insiders use to access network resources and simple measures enterprise IT can take to protect against the implied threats.

Modems

A lack of central management combined with easy-to-guess static passwords make modems an ideal entry point for insiders with detailed knowledge of a network. Many companies have tried to address this challenge by simply unplugging modems until needed. However, unplugging modems makes it impossible to use them for their intended purpose, namely remotely restoring critical systems in times of emergency or outage.

Given that modems are a necessity, enterprises must extend the same security and identity confirmation measures to modems that they do to other remote-network entry points. Extending corporate two-factor authentication measures to modems or replacing legacy modems with newer, more secure models with embedded multifactor authentication can provide appropriate and cost-effective protection.

Open file transfer

Most organisations use open file transfer to patch network infrastructure. Internal technicians and vendors use this poorly secured, unrestricted access to troubleshoot, apply appropriate fixes and correct problems. However, they also can misuse this freedom to change files, remove critical components or disrupt systems, resulting in non-perational systems, website defacements, data theft and other damaging situations.

A disgruntled or former employee could have the knowledge and motivation to commit such acts. However, more often, an insider threat can be less dramatic but equally troublesome. Even well-intentioned employees can be careless or make inadvertent mistakes. As such, protecting information assets requires you to have control over who can upload and download files, and a clear and easily retrievable record of all changes made to the system and the person who made them.

Traditionally, limiting and monitoring open file transfer required that individual permissions be set on each machine, causing headaches for IT departments. However, new technologies, such as vendor access and control (VAC) systems, can limit access and monitor activities organisation-wide or for specific systems.

NEXT PAGE Steps to take to stop open telnet, SSH ports and server console ports offering insiders access to your network.

  1. Simple measures to stop internal data theft
  2. Steps to take to stop open telnet, SSH ports and Server console ports offering insiders access to your network

Visit Business Advisor for the latest business IT news, reviews, tips and tricks

You may have protected yourself and your company from an external threat of data theft and sabotage, but what about internal threats? Here are the five most common methods insiders use to access network resources and simple measures enterprise IT can take to protect against the implied threats.

Open telnet and SSH ports

Companies that use third parties to remotely access and troubleshoot systems should properly secure or close telnet and SSH ports. Without these protections in place, all a remote technician needs is a single internal IP address to get anywhere on your network without your knowledge.

It is dangerous to assume that remote technicians have limited knowledge of your IP addressing schemes, as it is possible the same technician has worked on site at your facility. Also, infrastructure equipment often shares one easily guessed password, making it simple for an insider to access unauthorised equipment.

As a standard practice, it is recommended that companies restrict third-party access via telnet or SSH to systems beyond the typical scope of their services, unless the session is recorded or actively shadowed by a member of your team. Alternatively, many organisations use intermediary systems to create a proxy for these sessions, adding the needed level of control and tracking.

Server console ports

Technicians frequently connect to serial console ports, very often on routers and Linux/Unix servers. To provide scalable access, companies will typically connect to serial console ports using terminal servers. However, terminal servers, by default, offer minimal security.

By gaining access to a single terminal server, an insider can access and potentially disable thousands of systems. As such, it is recommended that companies regularly review terminal server security capabilities and place security devices outside the console ports of systems hosting sensitive data (for example, financial records, customer data and human resources information).

Unmonitored extranet traffic

Extranets provide a convenience for companies, allowing them to open their networks to vendors, customers and partners to support real-time collaboration. Extranets (for example, IPSec, SSL, remote desktop) work reasonably well when the number of systems to be shared with outsiders is small and the authorisation level on those systems can be tightly controlled. However, typical extranets, where access to many systems is required or where high-level authorisation must be granted, can be problematic.

Often, too much access is granted inadvertently, and activities cannot be closely monitored and controlled. As opposed to typical extranets, vendor access and control systems offer the extra layer of control needed to prevent sabotage and data theft.

While many third-party providers are trustworthy, it is risky to make that assumption. Regardless of whether employees and/or third-party providers access your network, human motivations remain the same. With any insider, there is the prospect of misuse, possibility of mistakes, and opportunity for theft. Increased awareness combined with a few protective measures can reduce the risk.

  1. Simple measures to stop internal data theft
  2. Steps to take to stop open telnet, SSH ports and Server console ports offering insiders access to your network

Visit Business Advisor for the latest business IT news, reviews, tips and tricks