Insider Threat Exaggerated, Study Says
Insiders are not, after all, the main threat to networks, a detailed new analysis of real-world data breaches has concluded.
Verizon's 2008 Data Breach Investigations Report, which looked at 500 breach incidents over the last four years, contradicts the growing orthodoxy that insiders, rather than external agents, represent the most serious threat to network security at most organizations.
Seventy-three percent of the breaches involved outsiders, 18 percent resulted from the actions of insiders, with business partners blamed for 39 percent -- the percentages exceed 100 percent due to the fact that some involve multiple breaches, with varying degrees of internal or external involvement.
"The relative infrequency of data breaches attributed to insiders may be surprising to some. It is widely believed and commonly reported that insider incidents outnumber those caused by other sources," the report states.
"Our caseload showed otherwise for incidents resulting in data compromise. This finding, of course, should be considered in light of the fact that insiders are adept at keeping their activities secret."
Fifty-nine percent of breaches were attributed to hacking, 31 percent involved malicious code, 22 percent exploited vulnerability, with 15 percent involving a physical threat. Sixty-two percent -- the overwhelming majority -- had at their root human error.
Nevertheless, the report cautions from using the statistics to dismiss the internal threat altogether. When internal or partner security compromises happen, they tend to involve greater amounts of data. Where data loss was involved, external security breaches resulted in a media of 30,000 records being compromised, some way behind the figure for internal breaches, at 375,000.
When internal hacks occur, they tend to be nastier, with 50 percent blamed on IT staff themselves, way ahead of other types of employee.
The report concludes that honest network admins are obsessed with outdated ideas of perimeter security. Had data security been looked at within the network, almost nine out of ten data breaches could have been avoided.
"While a strong network perimeter is important, it cannot be the only or even the main layer of protection around sensitive information assets," the authors say.