A Facebook Engineer Stalked Female Users. A Dentist's Receptionist Stole Patients' Identities. Here's How to Prevent These Things From Happening at Your Company.Malicious insiders are the most dangerous security risk of all.

ByLarry Johnson

Opinions expressed by Entrepreneur contributors are their own.

Focus Stock Fotografico | Getty Images

A major risk to businesses is one that they often overlook -- rogue employees, also known as the "insider threat."

Related:No One Is Safe From the Data Breach Epidemic (Infographic)

While many companies today are devoting more resources to preventing hackers from stealing sensitive information, rogue employees can pose a far more serious risk because they have inside access to company secrets, clients and technologies, and they are often not sufficiently monitored. According to the Ponemon Institute, the cost of an insider-related incident is actually higher than a data breach caused by an outside hacker -$4.3 millionper incident versus$3.62 million, respectively, and these costs could exceed$8 million over a 12-month period.

Insider threats are also on the rise. A2018 report by the Ponemon Institutefound that malicious insider incidents have grown by 56 percent since 2016.

A quick scan of the news on any given week will show how prevalent these cases are. For instance, in a recent case atFacebook,a security engineerwas accused of abusing his privileged access to stalk women online. In January, aChinese company was found guiltyof using an AMSC employee to steal $800 million worth of intellectual property from that company. In April, a former Manhattan dental office receptionist wasconvicted of stealing the identitiesof over 650 patients. And the list goes on and on.

Related:Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

Yet, in spite of the risks, many companies remain unprepared. Nearly one-third of companies admit they have no ability to prevent or deter an insider attack, and only 9 percent consider their insider prevention measures to be effective, according to a2015 study by the SANS Institute.

Preventing this type of abuse isn't easy, but it can be done.

Here are four ways to manage the risk posed by trusted insiders.

Access controls

The key to reducing a company's exposure to insider threats is by creating strong "access controls" that prevent how much data a single employee is able to freely access in the first place.

No single employee should have unfettered access to all of the company's secrets -- rather, sensitive data should be siloed, and employee access should be decided on a case by case basis, determined by the employee's need to access such data in order to fulfill her duties. For example, a sales manager does not need access to the company's intellectual property, and an IT administrator does not need access to the company's client roster. The separate roles within a company should also be separated by the level of data access they have.

Related:Making Your Data Unreadable to Whoever Steals It Might Be the Only Way to Keep It Safe

Technical controls

In addition to establishing policy controls on data access, a company should also have in place strong technical controls that prevent over-access or abuse by insiders.

These controls should include: encrypting highly sensitive data, so that only specific people can access it; blocking or restricting certain types of tools and websites from employee devices, such as Tor, file transfer protocol (FTP) services, etc.; restricting the use of remote logins to the company's network; resetting passwords immediately for any terminated employee; and requiring regular password resets for all employee accounts in order to reduce the likelihood of learned or shared passwords.

Mobile device management

This is another crucial step, particularly in today's highly mobile and bring-your-own-device business world. A mobile device management (MDM) service enables a company to monitor the content on both company-owned and personally owned devices, as well as to containerize company data and allow for remote wiping if needed.

Related:Why This Cybersecurity Expert Wants You to Rethink What You Keep Secret

Monitoring

There are many different tools available for keeping an eye on employees, ranging from all-inclusive Big Brother-style technologies that monitor all employee activity on devices (such as email, social media, web browsing, etc.) to more focused tools like exfiltration monitoring, which only look for files being transmitted from the company network to a remote IP address.

However, it's important for companies to not be too heavy-handed with employee monitoring, or it could backfire. If employees feel they aren't trusted or valued by the company, they could act out -- the exact thing the company is trying to avoid in the first place.

It is best to take a more moderate approach with monitoring, by focusing on what really matters. Exfiltration monitoring, file access monitoring (who is accessing important files, and when and where) and email monitoring are three good steps to take.

Related:What You Need to Know About Multifactor Authentication

虽然没有完全消除的方法insider threat, by taking a few key steps, companies can drastically lower their risk and keep employees in check. For more on this issue, see theFBI's tip sheeton averting the insider threat.

Larry Johnson

Chief Strategy Officer at CyberSponse

Larry Johnson is chief strategy officer ofCyberSponse, a Washington, D.C.-based cyber incident response company serving Fortune 500s and government agencies. He is a 24-year veteran of the Secret Service, where he served as a high ranking supervisor at the Presidential Protection Division as well as special-agent-in-charge of its Criminal Investigative Division. He is also a former chief security officer (CSO) at a Fortune 250 company and a recipient of the International Association of Credit Card Investigators' Police Officer of the Year award and the 9-11 President's Distinguished Service Award.

Editor's Pick

Related Topics

Business Ideas

55 Small Business Ideas to Start in 2023

We put together a list of the best, most profitable small business ideas for entrepreneurs to pursue in 2023.

Marketing

Don't Give a Sales Pitch to a Journalist — Tell Them Your Story. Here's Why.

Most entrepreneurs are driven to sell their product or service in all conversations, but don't try doing that when speaking with reporters.