Intelligent CIO Africa Issue 18 | Page 96

WHICH CORPORATE INFORMATION IS KEPT ON THE COMPUTER OF WHICH EMPLOYEE – YOU CAN LEARN IT EVEN BY ACCIDENT .
FINAL WORD

WHICH CORPORATE INFORMATION IS KEPT ON THE COMPUTER OF WHICH EMPLOYEE – YOU CAN LEARN IT EVEN BY ACCIDENT .

Information security specialists helped our client to discover important documents stored locally on the disk by one of the employees who wasn ’ t allowed to access them . This is a serious violation of the internal regulations which requires urgent investigation . The employee ’ s computer appeared to have some software installed for remote control which he simply didn ’ t need in his work . The investigation revealed that the employee suspected of violations had no clue about the files stored on his computer . The actual culprit was a technical specialist who used the computer of the employee as a temporary network storage before transferring confidential data to a third party .
2 . Happy-go-lucky
The group of employees who become the perpetrators of leaks due to negligence , ignorance or naivety .
A total of 44,000 customers of Federal Deposit Insurance Corp . ( FDIC ) became victims of personal information leakage due to the technical incompetence of the company ' s employee who uploaded confidential data to a personal flash drive . Later it turned out that the information wasn ’ t used outside the organisation , however , with the help of special software FDIC was able to track the uploading of corporate information .
According to the Wombat Security 2017 State of the Phish Report , 28 % of employed
UK population and 35 % of the employed in USA do not know what " phishing " is . In January 2017 , a leak of personal data of 4,000 employees happened due to the fault of the colleagues who followed the link with the requirement to fill in the necessary tax forms . The letter which was sent on behalf of the CEO , appeared to be a phishing bait .
3 . Skeletons in the closet
Such employees are harmless until something provokes them . Their personal lives hide some ‘ hook ’ which attackers might want to benefit from . It can be anything from debts , drugs or alcohol addiction to adultery or other private details . Information security specialists put such employees in the risk group , because criminals can use their secrets to blackmail members of staff .
Incidents that occur due to ‘ innocent victims ’ can be detected ( and even prevented ) only by information security specialists . The ‘ victim ’, besides being unaware of what is going on , is ineffective in finding and neutralising the attacker due to the lack of technical skills and professional knowledge . Employees with ‘ skeletons in the closet ’ should be controlled permanently . IS specialists tend to react promptly to the incidents originated by this type of employee . The information leakage caused by employees from the second group – happy-go-lucky – happen more often because of their criminal carelessness and negligent attitude towards the basic set of rules . Let us give some examples :
1 . All mine is yours Information security specialists detected the account activity on the computer of an employee who was on vacation and didn ’ t have to show up even remotely . It turned out that before the vacation he delegated all the passwords to his colleague so that he wouldn ’ t be disturbed with constant inquiries . The company ' s routine forbade access sharing . The employee ' s computer kept confidential information which in case of leakage would lead to serious financial and reputational loss . The company managed to avoid the data breach , though the incautious employee was warned about possible threats and instructed .
2 . Innocent request for technical assistance Which corporate information is kept on the computer of which employee – you can learn it even by accident . For example , thanks to an email sent by some employee while asking for technical assistance . According to the Winnipeg Free Press , the leaked data of 3,700 employees was discovered when one of the colleagues sent the email containing the information while making a request for technical assistance .
3 . Force majeure Whitehead Nursing Home employee not only survived the burglary and lost valuable belongings , but also became the reason why his employer paid 15,000 pounds fine . That day when he took the corporate laptop with unprotected information home his house was robbed . According to the BBC News , confidentiality of the data referring to 46 employees and 29 patients was violated .
According to the SolarWinds survey , the majority of unintentional information breaches occur due to phishing , copying data to unprotected devices , loss of storage devices or using personal hard drives , accidental deletion or modification of information , use of corporate passwords outside the internal network , neglect of protection systems updating , incorrect configuration . According to the survey among federal agencies conducted in 2017 , there was an increase in deliberate insider leaks – 29 % vs 22 % in 2016 . Nevertheless , 44 % of respondents indicated that unintentional leaks are the main threat to information security . •
Jorina van Rensburg , Managing Director at Condyn
96 INTELLIGENTCIO www . intelligentcio . com