intelligentID | June 9, 2017
Last week, the U.S. government suffered the form of security breach that cybersecurity specialists the world over have long predicted – that a malicious employee with top-level security clearance can prove themselves to be the most dangerous of all enemies to security and cyber integrity – the Insider Threat. The FBI soon arrested Reality Leigh Winner, 25, at her Georgia home, according to a June 5th news release from the US Department of Justice, who was charged with “removing classified material from a government facility and mailing it to a news outlet.” According to the Justice Department, Winner was hired by Pluribus International Corporation in February and assigned to an unnamed government agency facility in Georgia where she held a top secret clearance.
The FBI was contacted by an unnamed government agency earlier that week, claiming that it had been contacted by an unnamed news outlet on May 30th regarding a top secret document it had received from someone in their agency. The government agency soon confirmed that the information was classified at the time. On closer inspection, the government agency found certain pages of the document had been folded or creased, suggesting that they were printed and carried out of a secured space. The agency conducted an internal audit and found six people who had printed the documents in question. Out of those six individuals, Winner was the only one who had email contact with the news outlet.
Although the government was swift in identifying and apprehending the cyber intruder in their midst, the issue of employee clearance and the potential windfall of such an Insider Threat attack is currently populating the news. With that in mind, how secure do you feel about your own network’s integrity?
Intelligent ID and The Insider Threat
As news of the government security breach hit the media, the experts at Intelligent ID were quickly contacted with clients and outlets regarding our own cybersecurity suite, and its meticulous approach to safeguarding every aspect of a network’s system. A security breach such as this is especially pertinent to satisfied users of Intelligent ID, as our construction specifically monitors a network’s endpoints, which, in similar circumstances, would have quickly recognized the Insider Threat activity and emails of the contractor in question. Intelligent ID is also the the only solution that can also integrate into the printer/MFP and detect prints, copies, and faxes of sensitive documents at the MFP itself.
Intelligent ID recognizes each step in a such an insider threat and includes multiple functionalities to address them all.
Intelligent ID is endpoint-based user monitoring and analytics software that secures organizations’ business assets by continuously monitoring and alerting management to suspect events taking place anywhere an endpoint may travel. This includes data loss or theft activity, compliance infractions, workplace liability issues, inefficient use of time and resources, infrastructure concerns, insecure file access, and more. For further information, visit us at www.intelligentid.com or contact us at firstname.lastname@example.org.