Forum Views ()
Forum Replies ()
Read more with google mobile :
Analysis: Cyber raids fuel calls for training, monitoring
|
Edition:
U.S.
Article
Comments (1)
Editor's Choice
Old worm won't die after 2008 attack on military
Cancer death rates continue drop: report
Mercury's origins may differ from sister planets
Facebook may be good for friendships, politics
U.N. climate talks make scant progress to save Kyoto
Teens, young adults may drive flu epidemics: study
Japan plant starts clean-up of radioactive water
Comment: Amid global cybercrime, accidental hacks risk jail
Video: Zoo seeks girlfriend for endangered parrot
Slideshow: Chile volcano erupts
Follow Reuters
Facebook
Twitter
RSS
YouTube
Read
IMF cuts U.S. growth forecast, warns of crisis
10:41am EDT
Quick Guide to the Greek crisis
9:21am EDT
Special report: Government in cyber fight but can't keep up
|
16 Jun 2011
Wall Street rises on hint of Greece plan, data
10:34am EDT
Analysis: Source of Greek crisis? A nation in denial
16 Jun 2011
Discussed
112
Obama weighs new steps to boost jobs
71
Republicans to debate, with Romney the frontrunner
60
Delaware police interview teen about Congressman Weiner
Watched
Airbus' view of flying in the future
Mon, Jun 13 2011
Hefner, fiancee split; Schwarzenegger mistress talks
Wed, Jun 15 2011
Gloom deepens for Research in Motion
3:26am EDT
Analysis: Cyber raids fuel calls for training, monitoring
Tweet
Share this
Email
Print
Related News
Citi says 360,000 accounts hacked in May cyber attack
Thu, Jun 16 2011
Analysis: Computer security attracts venture capitalists
Wed, Jun 15 2011
Malaysia tries to stop threatened cyber attack
Wed, Jun 15 2011
Hackers break into Senate computers
Tue, Jun 14 2011
IMF cyber attack aimed to steal insider information: expert
Sun, Jun 12 2011
Analysis & Opinion
Amid global cybercrime, accidental hacks risk jail
Data breach overload: Is it time for a new law?
Related Topics
Technology »
U.S. Department of Homeland Security (DHS) employees work on the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) operational watch floor where they monitor, track, and investigate cyber incidents in this handout photo taken October 29, 2009 at the Idaho National Laboratory in Idaho Falls, Idaho.
Credit: Reuters/Chris Morgan/Idaho National Laboratory
By William Maclean, Security Correspondent
LONDON |
Fri Jun 17, 2011 10:13am EDT
LONDON (Reuters) - Employers rushing to boost cyber defences after a rash of U.S. online break-ins won't block spies and thieves by simply throwing technology at the problem, since their core weakness is often badly-trained and -managed workers.
In the cyber realm, as in other areas of security, the human factor is a pervasive vulnerability, be it theft by malicious "insiders" or inadvertent breaches by employees clicking on a compromised link, analysts say.
More rigorous training may not end the abuse of corporate cyber systems -- the sophistication of some hacker tactics is so great that 100 percent security is probably unattainable -- but it can significantly reduce the risks, specialists say.
The same goes for the adoption of intrusive new ways of monitoring employee online behavior and compliance with good cyber practice, some security specialists say.
"(High-tech) Bells and whistles are no use if you don't have trusted, loyal and well-informed staff," said an industry executive who spoke recently at a closed door cyber seminar.
Many experts say much more can be done to tighten security at the "endpoint" -- in other words, people -- rather than place excessive reliance on clever software, important as that is.
Some experts see a need to carry out security vetting when hiring key staff, for example computer system administrators.
"Technology is only a part of the problem -- all systems are composed of people, processes and technology -- you only need to break one of the components to attack the system," said Steve Purser, a senior expert at the European Network and Information Security Agency, a European Union body.
He said there were no hard and fast rules about monitoring staff online because data differed in sensitivity and context.
"The important point is to communicate the rules to staff and to ensure that the rules are being followed," he said.
The need is urgent, not least because employers are worried recession may swell the ranks of staff in line for retrenchment who plan to take proprietary data with them out of the door.
Some are queasy about the notion of intruding on employees' online work. But then, analysts note, hackers are doing exactly the same thing -- and imperiling jobs into the bargain.
"It's the people side of the equation that is letting the bad guys through right now," Neil Fisher, Vice President of Global Security Solutions at Unisys Corp told Reuters.
He was referring to 'phishing' attacks, a hacker ploy to obtain data such as passwords or bank details by posing as a legitimate institution.
"KNOW YOUR INSIDER"
In advanced "spear-phishing" campaigns hackers craft personalized e-mails, often using data available on social media websites, duping recipients into downloading attachments that launch malicious software that takes over their computers.
Such ploys are suspected in at least some recent prominent attacks, which have targeted entities such as the International Monetary Fund, Central Intelligence Agency, the U.S. Senate, and companies such as Citigroup and Lockheed Martin.
Mohan Koo, CEO of Dtex Systems (UK), said most organizations tended to over-prioritize the risk of external threats, a tendency he said was prevalent in the financial sector.
"For years now investment banks have lived by the motto Know Your Customer' today it's more critical that they focus on Know Your Insider' because that is where they have a weakness."
"The problem is that most organizations don't monitor their insiders with a sufficient level of granularity to quantify the threat to their business. If they did, the shock would be sufficient to spark a significant change in their approach."
A March 28 study by computer security firm McAfee and U.S. government consulting company SAIC said the most significant threat reported by organizations when protecting information was data leaked accidentally or intentionally by employees.
ECONOMIC PAIN MAY RAISE RISK OF ABUSE
The risk of malicious theft of data or intellectual property by insiders for private gain or to boost value to potential new employers may rise as Western economies struggle, analysts say.
A 2011 survey of cyber crime by Verizon, the U.S. Secret Service and the Dutch High Tech Crime Unit noted concern among industry experts that financial strain would cause an increase in insider abuse, although evidence was sparse so far.
An 2010 Imperva cyber security company study of 1,026 people in several business districts in London showed that if rumors were circulating about possible redundancies, 37 percent of respondents said they would want to take information with them.
Tony Dyhouse, a security expert at Britain's ICT Knowledge Transfer Network, told Reuters a lot of the insider threat was actually "from people who are no longer inside."
"They've left the company but they still have access credentials, they may still have site passes and computer access. All too often people leave the company and their accounts are not closed down.
"People are aware of the value of data and they will try and keep things and send information home. They actually take preemptive action, so 'now I am going to get my own back, or at least I am going to make sure I have the capability to do so'." (Editing by Philippa Fletcher)
Technology
Tweet this
Link this
Share this
Digg this
Email
Reprints
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (1)
PHenry13 wrote:
Let’s see. These same companies have been laying off highly skilled American workers and moving the jobs overseas. Many of them also (ab)use the H-1B visa program which imports cheap, foreign workers to take the few jobs that remain in America. Suddenly they are realizing the need for competent IT security professionals in America?
Jun 17, 2011 11:13am EDT -- Report as abuse
See All Comments »
Add Your Comment
Social Stream (What's this?)
© Copyright 2011 Thomson Reuters
Editorial Editions:
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
United States
Reuters
Contact Us
Advertise With Us
Help
Journalism Handbook
Archive
Site Index
Video Index
Reader Feedback
Mobile
Newsletters
RSS
Podcasts
Widgets
Your View
Analyst Research
Thomson Reuters
Copyright
Disclaimer
Privacy
Professional Products
Professional Products Support
Financial Products
About Thomson Reuters
Careers
Online Products
Acquisitions Monthly
Buyouts
Venture Capital Journal
International Financing Review
Project Finance International
PEhub.com
PE Week
FindLaw
Super Lawyers Attorney Rating Service
Reuters on Facebook
Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
NYSE and AMEX quotes delayed by at least 20 minutes. Nasdaq delayed by at least 15 minutes. For a complete list of exchanges and delays, please click here.
Other News on Friday, 17 June 2011 Sudan border state foes agree to talks: Mbeki
|
Israel to stop Gaza flotilla regardless of cargo
|
Police blame Islamist sect for deadly Nigeria blast
|
Zvonareva, Venus dismissed in Eastbourne; Vinci tops Wickmayer in Holland
Diving scientist takes to Arctic in attempt to tame Beluga whales
IEA says increased global demand for oil will outstrip increased supplies
Analysis: In India, hotel operators invest and educate
|
Giants defensive end Osi Umenyiora unhappy with pact
Peralta, Raburn homers lift Tigers to 6-2 lead over Tribe in battle for first
Mexican police arrest drug boss El Brad Pitt
|
Number of hacked Citi credit card accounts rises to 360,000
'Lemonade Mouth' sequel, 'Shake It Up' Disney Channel movie in development
'Game of Thrones' star Sean Bean attacked outside London pub
Mexico suffers bad publicity from war with drug cartels
Oregon defensive back Cliff Harris to miss opener vs. LSU; indefinite suspension
RIM slashes forecast again, shares tumble
|
Oracle seeks billions in lawsuit against Google
|
Special report: Government in cyber fight but can't keep up
|
Spam clogging Amazon's Kindle self-publishing
|
Facebook may be good for friendships, politics
|
Microsoft releases Kinect software for developers
|
Niche chipmaker eyes M&A to gain analog talent
|
NY police to investigate Tupac robbery confession
|
Woes of famous, powerful shine light on sex addiction
|
R&B singer Ledisi gets introspective on new album
|
Crusading poet embodies Mexico's drug war pain
|
Rebels dismiss election offer, NATO pounds Tripoli
|
Assad's tycoon cousin, target of protesters, quits
|
Greek PM jettisons finance minister in crisis reshuffle
|
Secretary Gates thanks Pentagon journalists for critical coverage
Dallas delights in Dirk Nowitzki, champion Mavs
China to boost coastal forces amid sea tensions
|
Robert Rock's 70 might be best first day effort at U.S. Open, considering...
Cuba, others cause trouble in U.N. re-election: envoys
|
U.S. Open nightmare for Phil Mickelson: "I played horrific!"
China raises flood alert to top level, 555,000 evacuated
|
Fan-tastic pitching: Gio Gonzalez' 10 K's power A's past Royals
Sony hacker claims responsibility for CIA website shutdown
Capitol Roar: McIlroy wows 'em with first round 65, leads at U.S. Open
Exiled Thaksin seeks December return to Thailand
|
Al-Qaeda appoints Zawahiri as Osamas successor
Nortel resets bidding date for patent portfolio as Google joins bidder list
Fukudome four RBI help Cubs outslug Brew Crew
Somali pirates free German ship after ransom paid
|
BlackBerry maker slashes forecast, shares tumble
|
Samsung Electronics, Hynix tumble on Q2 earnings worries
|
Exclusive: China software bug makes infrastructure vulnerable
|
Hacktivists make noise on government websites
|
Google-backed Xunlei postpones Nasdaq IPO: IFR
|
Green Lantern emerges from obscurity; critics pounce
|
U2 guitarist the Edge loses bid for Malibu mansion
|
From bomb silo to big screen, an anti-nuclear quest
|
Shelling erupts in Sudan's Abyei, official says
|
Rebecca Black pulls 'Friday' video off YouTube
Yemeni government says Saleh to return from Saudi in days
|
The Big O: Miguel Olivo delivers key hits for Mariners in bid for AL West crown
Recently displaced Filipino armers hit by flooding
Analysis: Medvedev promotes himself as candidate for change
|
Gaddafi government talking to rebels: Russian envoy
|
Food prices mean trouble for poor and politicians
|
Buzz Aldrin files for divorce from third wife
Health care by hovercraft
Libyan prisoners stuck in limbo as war drags on
|
Angola's `sans papiers' violently deported in new wave of expulsions
DEVELOPING: Pentagon investigation continues as FBI on scene
Retailer Carrefour, smartphone maker Research In Motion lower expectations
Justin Uptons homer in 10th lifts D-Backs over Giants in series finale
ILO milestone for domestic workers
Analysis: Cyber raids fuel calls for training, monitoring
|
Businesses seen as target for easier phone hacking
|
Special report: Government in cyber fight but can't keep up
|
Susan Boyle story to be turned into musical
|
Basel art fair suggests boom times are back
|
Danish Ballet, revamped, takes fresh U.S. tour
|
Greece at new risk of being pushed off euro
Bodies of missing Tenn. mom, Jo Ann Bain, and daughter found
Female Breasts Are Bigger Than Ever
AMD Trinity Accelerated Processing Units Now in Volume Production
The Avengers (2012 film), made the second biggest opening- and single-day gross of all-time
AMD to Start Production of piledriver
Ivy Bridge Quad-Core, Four-Thread Desktop CPUs
Islamists Protest Lady Gaga's Concert in Indonesia
Japan Successfully Broadcasts an 8K Signal Over the Air
ECB boosts loans to 1 trillion Euro to stop credit crunch
Egypt : Mohammed Morsi won with 52 percent
What do you call 100,000 Frenchmen with their hands up
AMD Launches AMD Embedded R-Series APU Platform
Fed Should not Ignore Emerging Market Crisis
Fed casts shadow over India, emerging markets
Why are Chinese tourists so rude? A few insights