http://www.darkreading.com/insiderthreat/security/management/showArticle.jhtml?articleID=227300424 By Robert Lemos Contributing Writer DarkReading Sept 08, 2010 The recently revealed abuse of insiders' system privileges to commit fraud at Sprint could be a wake-up call for other enterprises to implement more stringent security practices, experts said this week. Last week, nine Sprint employees were charged with misusing their access to the telecommunications giant's systems to redirect phone charges to other customers by "cloning" their cell phones -- to the tune of more than $15 million in fraudulent charges in the first six months of this year. The case highlights the need for enterprises to implement controls that will help them catch insiders who might be focused on fraud, says Dawn Cappelli, technical manager of the threat and incident management team at Carnegie Mellon University's Software Engineering Institute CERT Program. "Any controls that organizations can think of to put on their systems, as far as what data should this person be accessing [or] what would look out of the ordinary, are important," Cappelli says. Such attacks are becoming more common, according to CMU's Software Engineering Institute. Last year, more than half of the respondents to the group's 2010 CyberSecurity Watch Survey said they were the victim of an insider attack. The average insider attack lasts about 15 months, Cappelli says. [...] _______________________________________________________ Subscribe to InfoSec News - www.infosecnews.org http://www.infosecnews.org/mailman/listinfo/isnReceived on Wed Sep 08 2010 - 23:10:37 PDT
This archive was generated by hypermail 2.2.0 : Wed Sep 08 2010 - 23:17:31 PDT