According to the IBM Cyber Security Intelligence Index, 60 percent of database attacks originate from insiders. This may sound like a troubling statistic, considering most companies rely on their employees to be faithful and work within the law, but you’d be wise to read further before you panic. In reality, an insider threat does not necessarily mean that an attack is coming from someone within an organization. Outsiders using stolen data are classified as insiders as well.
How to Prevent a Database Breach
How can an enterprise protect its information and prevent a database breach? After all, the credentials provided by the perpetrator are legitimate. Steve Hunt, writer of industry insight for GCN, posted a list of five of the best practices companies can undertake in order to avoid ruin:
1. Continuously Discover The Entire Database Infrastructure
Agencies often underestimate just how many active databases they possess. Unknown databases generally run using default credentials that attackers can easily take advantage of. Automated database discovery is a crucial investment for avoiding this.
2. Implement Privileged Session Management
A privileged session manager (PSM) allows users to connect to systems without exposing private password information. The PSM also records session activity, ensuring that any changes made are easily tracked and monitored.
3. Enforce Least-Privileged Access
Employees gain more responsibilities the longer they’re with a company. This seniority based structure should also apply to database permissions.
New employees should not be given full access and even senior roles should only be given exactly the access they require for their positions. The less exposure a database is given, even for the most trusted users, the safer it will be.
4. Enforce Strong Passwords
Your employees don’t use weak passwords for their email accounts, so why should they use them when dealing with your company’s most sensitive data?
It may seem like an obvious preventative measure, but it bears repeating: use strong passwords!
5. Implement Advanced Compromised Credential Identification
Authorized individuals use databases in a predictable and recurrent way. When an unauthorized user is accessing your database, it’s very clear based solely on their movements within the system.
Automated machine learning-based security appliances can catch an unwanted user in their tracks based solely on algorithm analysis, preventing a massive data breach before it ever happens.
Let’s Get To Work
Database security flaws, if exposed by the wrong person, are expensive to patch up, and come with negative press, which is hard to recover from. While it’s impossible to guarantee that a database breach will not happen, there are certain tools organizations can use to prevent a database breach. Using these five measures will give create the deterrence your company needs.