Aviva data breach story, Márton Illés, product evangelist at BalaBit have the following comments on it.
[su_note note_color=”#ffffcc” text_color=”#00000″]Márton Illés, Product Evangelist at BalaBit :
“What is worse than being hacked? Being hacked and then learning about it from the news headlines or – even worse – learning about it from your very own customers.
This is exactly what has just happened to Aviva recently. A malicious insider again leaked some customer data and Aviva failed to detect the leak in time.
Organisations need to understand that insiders pose a particular challenge as they’re already a few steps ahead compared to external attackers. They have legitimate access to data and know the organisation’s systems in depth.
Timely detection of suspicious behaviour can actually prevent the data leaving the organisation – and at least gives organisations a chance for proper remediation. This can be done by monitoring user’s activities in real-time to detect possible breaches as they occur.
Combatting insider threats is hard job; especially finding the right balance between efficient security and usability. If users are faced with too many controls it can make everyday work difficult and eventually destroys morale. User monitoring provides not just an efficient and user-friendly way of closing security gaps, but also an accurate second layer of defence in addition to control measures.”[/su_note][su_box title=”About BalaBit” style=”noise” box_color=”#336588″]BalaBit‘s global customer base includes many Fortune 100 companies. BalaBit’s Contextual Security Intelligence (eCSI) gives enterprises real-time analyzed monitoring information to support security decisions and increase business efficiency, while providing IT with reliable Log Management, Privileged User Monitoring and User Behavior Analytics. BalaBit, founded in 2000, has long track record as the developer of syslog-ng, the most popular open source log management tool with more than a million corporate users worldwide.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.