More than 40% of all breaches are committed by insiders.*
The greatest harm to your IT operation is likely to come not from outsiders or end-users, but from infrastructure insiders—systems administrators, network architects, system analysts, developers, and site reliability engineers. Some of these people work for you, and some may work for third parties or cloud providers.
These people often require authorized access to systems, networks, and applications to do their jobs. However, they may accidentally expose data or make mistakes that allow others to steal or damage sensitive information. Breaches may also occur unintentionally due to lax security protocols.
*According to InfoSecurity magazine.
These incursions fall into three main categories
In 2019, two Twitter employees were charged with spying for Saudi Arabia by accessing information on Saudi dissidents using the Twitter platform. Hackers are also able to get root access and breach supposedly secure systems.
The move to cloud computing compounds the problem since there’s limited accountability and control over the personnel at IT cloud platform providers who are able to access your data.
In 2020, hackers used a supply chain attack to target Solarwinds, a company that provides system management tools for network and infrastructure monitoring hundreds of thousands of organizations around the world. The malware installed was then unwittingly sent out in software updates to Solarwinds customers.
Bad actors present credentials that make them appear to be insiders. In early 2021, cyber security firm FireEye said Russian hackers stole tools that could be used to carry out attacks around the world.
Unauthorized hacking compromised the personal information of nearly 383 million Marriott guests. The incursion went undetected for nearly five years—which is not unusual. Often, these attacks aren’t detected until the stolen information is used months or years later.
“Anjuna Confidential Cloud software provides the answer to the problem CIOs and CISOs have been chasing for decades: seamlessly running trusted workloads in uncontrolled and/or hostile environments and preventing data leaks, all while maintaining productivity.”