View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 17, 2014

Beware of the enemy within

Companies must guard against insider threats.

By Duncan Macrae

An information protection specialist has urged businesses to be wary of insider threats on the back of the news of the NSA’s spying on offline computers.

Stephen Bonner, a partner in KPMG’s Information Protection & Business Resilience team, believes IT managers need to re-evaluate the way in which they view the security landscape.

He said: "It is tempting to break the world of cyber security into the attacks we see against our networks from the outside, malicious action by insiders, and then physical attacks on systems. This has been a convenient taxonomy in the past, but sometimes leads us to forget that our adversaries don’t always think this way and that the boundary between cyber and the physical world is blurring.

"Organised crime groups, hostile corporates and countries may be just as interested in recruiting insiders to help them as they are to attack systems remotely. Attacks on physical targets can also be a very effective way into corporate networks – whether it is sniffing WiFi networks, looking for open network ports in visitor areas, or finding opportunities to attach the sort of kit we saw in recent attacks against UK banks – a simple keyboard, video, mouse switch or key logger."

The recent disclosures from NSA whistleblower Eric Snowden have also shown just how interested States can be in these sorts of attacks. Information collected from external networks and social media can make targeting and social engineering easier, and a little tampering with network devices in situ makes remote access so much more straightforward.

Bonner added: "The key is to take a holistic view of the threat – thinking about who your adversaries might be, what they might be after – and the various ways they might achieve their goals. Moreover, keeping the different branches of security talking matters – cyber exercises or war games are a good way of making sure they can work together to deal with any incident. In short – attackers don’t respect your stovepipes."

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU