Bloomberg Businessweek - March 16, 2015

Page 41

Focus On/ Security

Someone is stealing your fingertips 41

Big-game hunters for bugs 41

I lost my data at the trade fair 42

March 16 — March 22, 2015

Tracking the Enemy Within Companies are monitoring employees’ work habits and e-mail to neutralize insider threats

ILLUSTRATION BY 731

“People said, ‘Wow, if that happened in the NSA, it could happen to us’ ” the game is constant surveillance.” Whether you call Edward Snowden a Fortscale and competitors such as traitor or a whistle-blower, he earned Securonix, based in Los Angeles, sell one label about which there’s no software that pulls data from a comdebate: insider threat. pany’s computer systems and feeds it Guarding against such risks is an expanding niche in the security industry, through algorithms to create a profile of each employee. The software constructs with at least 20 companies marketing software tools for tracking and anaa base line showing what’s normal lyzing employee behavior. “The bad behavior for that user: where and when guys helped us,” says Idan Tendler, the he logs in, which programs he uses, founder and chief executive officer of which company databases he accesses Fortscale Security in San Francisco. “It started with Snowden, and people said, ‘Wow, if that happened in the NSA, it could happen to us.’ ” YOU’RE HIRED!! The problem predates the Internet: the salesman who takes the entire customer list with him when he quits, or the engineer who makes off with key product designs. But technology has only made it easier; now the salesman e-mails the data to his Gmail account, and the engineer can put product designs on a USB drive. In an embarrassing episode for Morgan Stanley, the bank dismissed an employee earlier this year for taking information about an estimated 350,000 clients of its wealth-management division. Companies are also realizing that tracking insiders may improve their odds of catching outside hackers. While investigations into the breaches at Sony and Anthem are ongoing, it’s likely that attackers hijacked employee passwords and logins, then used them to navigate the companies’ computer systems to find and steal data. These methods are the reason it takes a business more than 200 days, on average, to detect breaches, according to FireEye, a cybersecurity company. “Hackers become employees when they get inside,” says Avivah Litan, an analyst at research firm Gartner. “So the name of

regularly, and which external websites he browses. It also generates a risk score for users based on what danger they may pose to the organization. With “normal” established, it becomes much easier to spot suspicious activity—for example, a worker downloading thousands of documents from a database she has permission to use but never has before. “What we’re trying to do is get this situational awareness,” says Igor 39


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Bloomberg Businessweek - March 16, 2015 by Lawrence Ambrocio - Issuu