Data Loss Cisco
Data Loss Cisco
Data Loss Cisco
33 percent of IT professionals were most concerned about data being lost or stolen through
USB devices.
39 percent of IT professionals worldwide were more concerned about the threat from their
own employees than the threat from outside hackers.
27 percent of IT professionals admitted that they did not know the trends of data loss
incidents over the past few years.
Mitigating data leakage from insider threats is a difficult challenge. Businesses must take
advantage of every opportunity to better understand how employee behavior and intent relates to
security issues, and to make security a priority in every aspect of business operations.
Introduction
Although some hackers might still be planting viruses and worms to interrupt business operations,
most are focusing on profit. Identity theft, selling your sensitive technical or financial information to
competitors, abusing your customers confidential data, and misusing your corporate name or
product brands are just some of the ways that hackers can profit from breaching your security and
obtaining confidential content.
The threat of attack from outside the company is real, and warrants significant concern and action
from IT professionals. But massive data loss also results from internal activities.
The insider threat is often characterized as an employee performing malicious behaviorthrough
sabotage, stealing data or physical devices, or purposely leaking confidential information.
However, organizations need to be aware that the insider threat is not just the rogue employee, but
rather every employee and every device that stores information. Employees are insider threats if
they speak loudly about confidential project plans while on the phone at the airport. A lost laptop
containing company information can become an insider threat if it is recovered by an outsider with
malicious intent.
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 6
White Paper
The first two papers in this series focused on employee behavior that had the potential to
jeopardize corporate data security. This paper looks more deeply into specific insider threats to
data, through both negligent and malicious actions by employees. Mitigating the full gamut of
threats from employees is an enormous challenge, with an unacceptably large cost of failure. IT
professionals must be innovative and persistent in addressing security threats as we all move
forward in the digital age. Understanding the insider threat is a critical part of that process.
43 percent of IT professionals said they are not educating employees well enough.
19 percent of IT professionals said they have not communicated the security policy to
employees well enough.
Lack of Diligence
Common examples of employee behaviors that demonstrate a lack of diligence with respect to
safeguarding sensitive information include speaking loudly about confidential information in public
places, failing to log off laptops, leaving passwords in sight or unprotected, and accessing
unauthorized websites. A particularly large threat in this area comes from employees who lose
corporate devices such as laptops, mobile phones, and portable hard drives, or have those
devices
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 2 of 6
White Paper
stolen because they are not properly safeguarded. Of these devices, the loss of portable hard
drives was the top concern among IT professionals. New 64-GB removable devices that allow an
entire hard drive to be copied onto a device the size of a pack of gum make it easier than ever to
access, move, or lose intellectual property or customer data.
Nine percent of employees reported that they have lost or had their corporate device stolen.
Of those employees who reported loss or theft of a corporate device, 26 percent
experienced more than one incident in the past year.
The top concern among IT professionals regarding data leakage was the use of USB
devices, with 33 percent sharing this concern globally. The number-two concern was email;
25 percent of global IT respondents shared this view.
When asked why their employees are less diligent in safeguarding intellectual property, 48
percent of IT professionals responded that employees are dealing with more information
than ever before, and 43 percent listed a growing apathy toward security stemming from
the quickening pace of employees jobs.
Employee reasons for keeping their corporate devices when leaving a job included needing
the device for personal use (60 percent), getting back at their companies, and a belief that
their previous employers would not find out.
20 percent of IT professionals said disgruntled employees were their biggest concern in the
insider threat arena.
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
White Paper
Table 1.
US
(n=100)
BRA
(n=101)
UK
(n=104)
FRA
(n=100)
DEU
(n=101)
ITA
(n=101)
CHN
(n=100)
JPN
(n=101)
IND
(n=100)
AUS
(n=101)
6%
Known someone
at work who has
accessed someone
elses computer to
look for
unauthorized
personal or
corporate
information
3%
7%
4%
14%
4%
3%
8%
0%
10%
6%
Accessed someone
elses computer
to look for
unauthorized
personal or
corporate
information
5%
1%
7%
3%
12%
2%
5%
11%
1%
4%
0%
Known someone
at work who has
stolen computers
or other equipment
containing corporate
data from your
company
3%
1%
3%
2%
4%
2%
8%
3%
0%
6%
0%
Known someone
at work who has
sold corporate data
to another party
for profit
3%
0%
5%
1%
3%
3%
1%
5%
3%
4%
1%
Stolen computers
or other equipment
containing corporate
data from your
company
1%
0%
0%
0%
1%
0%
2%
0%
0%
3%
0%
1%
0%
2%
0%
0%
2%
2%
0%
1%
2%
0%
89%
96%
85%
93%
79%
93%
87%
82%
96%
84%
94%
Limited IT Awareness
Any insider threat is significant, but the potential impact of insider threats can be amplified when
there is a disconnect between ITs perception of employee behavior and the reality of users
actions. Twenty-seven percent of IT professionals admitted that they did not know the trends of
data loss incidents over the past few years.
The contrast between employee behavior and IT perception is highlighted further by projections for
the future. Fifty-seven percent of IT professionals believe that data leakage incidents will not
decrease in the next 12 months. That leaves a surprising 43 percent who believe that their data will
be safer over the next year, despite the survey findings that employees commonly disregard
security policies and engage in behaviors that put corporate data at risk.
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 4 of 6
White Paper
A more significant cost for any company is the operational expense associated with equipment
theft. When a device is stolen, an IT professional must resolve the issue by ordering and
configuring the new device, which drains valuable productivity that could have been used for other
purposes. Operations costs increase even further when the lost or stolen data or device is used for
malicious damage that the IT staff must spend valuable time correcting.
Capital and operating expenses are measurable indicators of the cost of data loss. Even though
these costs are painful, they pale in relation to a facet of loss that cannot be measured in terms of
a budget. That facet is the use of sensitive data to damage a corporate reputation, brand integrity,
or customer confidence. These factors can change the competitive landscape.
It is difficult to put a monetary value on the loss of data that is used for malicious purposes. How
much does it cost an organization to lose its competitive advantage because source code was
stolen or merger and acquisition plans were leaked before they were public? How much is your
brand worth? The loss of customer credit card information carries the dual impact of a regulatory
fine and the loss of customer confidence. Data is a priceless resource that must be protected.
Foster a security-aware culture in which protecting data is a normal and natural part of
every employees job, and not an additional task that is perceived as a burden or contrary
to other goals.
Provide the tools and education that employees need to keep data secure, starting with
new-hire training and continuing with verbal updates instead of email that might be ignored
or lost.
Evaluate employee behavior and the associated risks based on factors such as the locale
and the threat landscape. Then sculpt threat education, security training, and business
processes around that intelligence.
Continuously analyze the risks of every interaction between users and networks, endpoints,
applications, data, and of course, other users, to maintain an awareness of the threat
environment.
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 5 of 6
White Paper
Corporate cultures vary around the world, and there is no one right way to protect data. But the
insider threat is a global problem with costly consequences. Insider threats must be addressed
with the same energy as attacks from outside the company. Like outsider threats, addressing the
insider threat demands a comprehensive approach that includes education, policy, and
technology. Those companies that take the additional steps of addressing the nuances of their
individual corporate cultures and communicating with employees on a personal level will be even
better positioned to create and enforce sustainable security strategies.
Printed in USA
2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
C11-506224-00 11/08
Page 6 of 6