TECHNOLOGY

The Weakest Link: Humans As An IT Security Risk

Misconduct, inaccurate policies, and misconfigurations of endpoints are common vulnerabilities.

  • The cyber kill chain usually looks for the weakest link in the chain, which is often people.
  • An analysis of Bitdefender telemetry of 110,000 endpoints in the first half of 2020 shows that misconfigurations and the “employee weakness” are the number one causes of a very high percentage of cyberattacks.
  • Misconduct by employees can undermine the multi-layered security of defense solutions, which is particularly important for small and medium-sized companies.
  • Protection against human error will consist of a mixture of IT products plus security services in the future.

While in Hollywood films, hackers always break through security systems and firewalls with great effort, reality often looks different. Few attacks require a cinematic level of effort. Employed and incorrectly configured systems usually take over the main work and create vulnerable gateways. The episodes are also effectively aimed at the main weak points of corporate security – one of which is often the human being.

Endpoint misconfigurations cause about a third of all security incidents, and imprecise remote management policies leave hundreds of thousands of systems vulnerable. Plus: 93 percent of employees use old passwords again and again. According to Bitdefender’s Security Intelligence Cloud telemetry, this represents only a tiny fraction of the security incidents expected in organizations.

They buy unique solutions and hand over the responsibility to an already overstretched IT team. But the administrator needs help. Given the targeted attacks, specialized security services are a better answer. Only large organizations with the appropriate budget can afford these services of a Security Operations Center (SOC). In the meantime, however, the offer on the market has become more democratic. Managed Services Providers (MSP) and Managed Security Services Providers (MSSP) offer bundles of Enterprise Detection Response (EDR), Managed Detection and Response (MDR), and SOC services that are also available for smaller and medium-sized companies within reach.

Human Factor

Regardless of the security measures taken by organizations, user behavior remains a challenge. Human error doesn’t just include a person opening a malware attachment or falling for a phishing attack. It encompasses all user actions and behaviors that allow a malicious message to reach the employee, malware to gain a foothold or the security event unnoticed.

In addition, employees often subvert defenses by bypassing policies and IT processes in favor of procedures they find quicker and easier. A prime example is password reuse—the number one employee-caused risk. 93.1 per cent use login data they have previously used or used for other access. Companies are partly to blame for the misery: They allow employees to choose these passwords without determining how to change them. However, IT must define and enforce specifications that are intended to prevent employees from interfering with security-related processes and settings. The top management is also required to support such operations.

With The Wrong Attitude

Human errors happen to administrators too. With a lack of staff and given more complex systems, they are quickly overwhelmed. The risk begins with poorly defined enterprise-wide security policies. For hackers, they are heaven on earth. An analysis of Bitdefender telemetry from the first half of 2020 shows Window Remote Management (WinRM) is the front runner, and it is incorrectly set on 55.5 percent of all scanned endpoints. Attackers look for WinRM vulnerabilities and other patchy or poorly defined policies to dial into systems and take complete remote control of them. This allows them to run malicious code, change registry keys, or grant PowerShell access.

IT Left Alone

Due to the increasing sophistication and diversification of cyber attacks and chronically understaffed IT security departments, many companies are increasingly at risk. Larger companies can choose to run their SOC, and MDR services offer medium-sized and small organizations an effective and, in most cases, sufficient alternative to outsourcing security.

Such a dedicated security team then takes over and is responsible for the configuration of the endpoints – although it works remotely and still has a complete insight into the infrastructure. The best option is to provide organizations with a comprehensive endpoint risk analysis. Similar to a system audit, technological risks and dangers resulting from human error are analyzed.

MDR offers the benefits and expertise of a SOC at a fraction of the cost. MDR teams work with companies to create pre-approved incident response scenarios. In this way, the defence reacts correctly and faster. Often long before an initially undetected attack has compromised the infrastructure.

webtechcrunch

Recent Posts

Is Shmunguss Category On Netflix Real Or Fake? [Explained]

Recently on Tiktok there was a video that went viral and so many people had…

2 days ago

Sedecordle – Everything About This Unique Game [explained]

In recent days online games have become much more popular. Every corner in the world…

2 days ago

Steps To Fix “Verizon Sim Card Not Working” Error?

Are you looking For the answer to the query Verizon Sim Card Not Working then…

2 days ago

What Does ATP Mean In Texting? [Explained]

These days When you come across social media like TikTok, Facebook, Instagram and snapchat we…

2 days ago

Eduuolvera Alternatives To Download Apps & Games in 2024

Eduuolvera is a website which is popular for collection of various types of Apps and…

2 days ago

Heardle 70s – Explore The Music Of 1970s With Heardle 70s

Heardle 70s is very similar to the Heardle 60s, the difference is here you have…

2 days ago