Data Loss Prevention Articles

Corporate security: risks of the insiders attack

Corporate security is an important issue for every company, no matter how large or small. However, the nature and focus of corporate security have changed dramatically in the last 10 years. Most current businesses use digital technologies, computers, e-commerce solutions, wireless devices and other recent innovations to run more efficiently.

Unfortunately, these also pose a threat to system integrity with security breaches being reported regularly. The focus of corporate security is changing to include these new ways of doing business, and so has the budgets of security departments and agencies. In fact, billions of dollars are spent each year on electronic corporate security solutions intended to fight off hacker attacks. However, what most people fail to realize is that:

  • statistically over 80% of security breaches are caused by insiders - most often employees.
  • more than 20% of attacks on the corporate WEB sites are coming from the inside!
  • almost 30% of companies, experience more than 5 attacks from the inside per year.

Usually, the goal of intrusions is to obtain valuable information, databases, research data, sales reports, marketing statistics, HR records, etc. The information can be sold and/or used by the perpetrators. Once information is located and duplicated, there are two ways to "carry" it out. The first is to transfer it via the Internet. The second is with physical media: floppies, CDs, external drives (ZIPs, USB drives, and many others), etc.

Unfortunately, standard access control solutions coming with Windows operating systems do not allow the assignment of permissions for floppy drives, CD-ROMs, other removable devices and for network connections on a per user basis.

Moreover, USB and FireWire ports are open by default so anyone can bring and plug a tiny device and download hundreds of megabytes of proprietary information.

There are two approaches to solve this problem. The first way is to cut off Internet access and remove all devices that can be used to transfer information (floppy drives, external drives, etc.) This approach is expensive, difficult and impractical for the majority of companies. The alternative is inexpensive software solutions. There are very few such solutions on the market right now and only two or three that deserve attention.

DeviceLock from DeviceLock, Inc. is a policy-based endpoint data leak prevention (DLP) security solution that enables network administrators to centrally control uploading and downloading activity through local computer devices and network protocols and applications. With DeviceLock you can lock out unauthorized users from USB and FireWire devices, WiFi and Bluetooth adapters, CD-Rom and floppy drives, infrared, serial and parallel ports, local and network printers, PDAs, smartphones and many other plug-and-play devices. Also, DeviceLock contains port-independent network protocol and application detection and filtering, message and session reconstruction with file, data, and parameter extraction, as well as event logging and data shadowing.

While no software solutions can completely eliminate risks, DeviceLock significantly reduces the vulnerability of your network to attacks both from outside and from within. This application was extensively tested in corporate environments and are being relied on by many companies around the world. It wins respect and recognition from system administrators and IT security professionals who employ them.

Being extremely user friendly, it does not require administrators to pore over help manuals just to learn how to use this program effectively.

Our product help hospitals to achieve HIPAA compliance and operate in a secure environment.