recommended reading

Survey: Abuse of Network Access Privileges Is Rampant

Pavel Ignatov/

Agencies are more concerned about insiders leaking citizens’ and partner organizations’ information than their own general business information, according to a new survey by the Ponemon Institute. Meanwhile, the commercial sector cares more about inappropriate disclosures of business data than customer data.

Ponemon surveyed 693 industry and government information technology personnel who had high-level access to internal networks. 

Overall, 59 percent, the majority of whom worked in industry, said their business information is most at risk without the right protections. Only 49 percent said client information is most in jeopardy.

Among participants employed at state, local and federal agencies, 54 percent said customer information is the most vulnerable type of information they need to protect. Roughly 42 percent of those government personnel indicated their own business information is most susceptible to leaks.

Commercial firms “probably feel it’s kind of more important that they need to protect their stuff versus customers,” said Michael Crouse, director of insider threat strategies for Raytheon Company, which commissioned Ponemon to conduct the study. 

Whereas, "the government, which kind of sees their customers’ information as what they have to protect," feels that client data is most unprotected, he said. "It’s kind of an interesting inversion."

Across the board, most (88 percent) of participants recognized that the abuse of IT access privileges is a cause for alarm. "But less than half that number, around 44 percent in the government, feel that they have a dedicated budget for investing in these technologies, investing in processes and procedures, to reduce the threat of the insider," Crouse said. 

Determining what to invest in is part of the challenge. Many analysts say more resources must be devoted to checking up on employees' behaviors, rather than just network security.  

About 74 percent of the government officials surveyed said personnel with high user privileges feel they are empowered to access all the information they can view, Crouse said. 

"Just because you are looking for information or accessing information, that in itself isn’t a violation for the most part," he said. "If you’re actually taking that information, or using that information, or sending that information, whether you do it deliberately or maliciously, that is a big problem."

Changes in employee feelings and perceptions can turn natural nosiness into malice.

Leaders need to have auditing mechanisms in place to ensure an employee's "sense of empowerment won’t do damage to the organization," Crouse said.

Technology that analyzes networks and machines for abnormal transfers isn't enough, many security specialists say.

Since 2010, when then Pfc. Bradley Manning allegedly shared classified intelligence with anti-secrecy website WikiLeaks, the Pentagon has spent millions of dollars on data loss prevention software to protect systems against breaches from within. 

That didn't stop ex-National Security Agency contractor Edward Snowden from allegedly leaking secrets about the Defense agency's spying operations.

Working from an office in Hawaii, he used login credentials and passwords that colleagues unwittingly provided him to access some of the material he divulged to the media, according to Reuters

Some former U.S. national security IT officials say the government doesn't need to start from scratch on a behavior surveillance system to stop rogue employees.

"It’s not new technology -- it’s a matter of making it more encompassing, making it more scalable, making it faster” at searching for signs of changes in conduct, Dale Meyerrose, the first chief information officer of the intelligence community under the Director of National Intelligence, told Nextgov. "A lot of it is the same infrastructure, the same sensors, the same networking technology. You just put in the software code new rules [detailing which databases to scour], new processes, new applications," he said.

(Image via Pavel Ignatov/

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.