Lack of Visibility into Worker Activity Leaves Companies Susceptible to Data Breaches


The report is based on data collected from risk evaluations carried out on the company’s clients and probable clients. Those danger evaluations underlined just how usual it is for workers to try to sidestep safety controls, download shadow IT, and violate business rules.

If your danger evaluation has identified workers trying to sidestep safety controls, you are not alone. As per the Dtex Systems report, 60% of danger evaluations disclosed attempts by workers to sidestep a company’s safety controls, use of private and unknown browsers, or cases where workers had researched how to sidestep safety controls.

In most instances, workers are trying to sidestep safety controls to gain access to websites that breach conventional internet usage rules – for example, adult content, gaming, and betting sites, and to access P2P file sharing websites. 67% of businesses found incorrect Internet use. It is also usual for workers to try to download shadow IT to make their works easier – use of tools, for example, Caffeine, Dontsleep, WireShark, or SnippingTool is widespread, even though those programs are banned.

Although there might not be any hateful intention, these actions endanger safety and might easily lead to the unintentional disclosure of confidential information or malware infections. Programs like open VPN tools and CCleaner are also usually downloaded – both of which are an indicator of workers trying to cover their tracks, possibly to conceal hateful activities.

72% of risk assessments concluded at least some workers were using high-risk applications or hacking tools and 90% of danger evaluations demonstrated workers were shifting data to unencrypted USB appliances. 78% of businesses also found company data that were publicly accessible online because of errors made by workers.

The 2018 Verizon Data Breach Investigations Report demonstrated nearly a third of the 2,216 proven breaches were initiated by insiders and insider data breaches are far more usual in the healthcare industry. Usually, in any given month, more healthcare industry data breaches are initiated by insiders than breaches initiated by external danger actors.

Although technological controls can be applied to improve safety, it is important not to disregard the human element. Safety consciousness training demonstrates workers how certain actions can easily lead to a data breach; however, workers are often conscious that some actions enhance danger, in spite of that they still engage in dangerous activities. Several workers do not think that their actions will lead to a data breach and continue taking risks. They depend on IT teams to tackle cyber security and take no personal responsibility for assisting to keep their business’s systems and data safe.

Safety teams can take steps to decrease danger, however, unless they have visibility into what their workers are doing they will not know the level of danger and might remain blind to these possibly risky activities.

Unluckily, no single solution can be used to defend against insider dangers. Only by using a variety of solutions will healthcare companies be able to tackle the issue of insider data breaches.

Besides performing normal risk analyses to find possible dangers, Dtex Systems proposes the use of Security Information and Event Management (SIEM), user behavior analytics, and data loss avoidance technologies. Moreover, worker monitoring solutions and user behavior intelligence are essential to highlight unusual activities and doubtful behavior. Such solutions will help safety teams identify insider dangers and take action before they result in a data breach.