Advertisement



 



Mass Data Theft - The Big COVID Consequence
Mass Layoffs Risk Exodus Of Corporate Data, Experts Warn


The suspension of office work followed by mass layoffs were devastating consequences of the COVID 19 virus once it took hold in the United States in February. Mass data theft may be the next.

As corporations across industries rush to trim their payrolls and stay afloat financially, they are inviting data loss on a large scale, as millions of departing workers take sensitive company files and other data with them on the way out the door, experts warn.

A Spike in Data Exfiltration

Since February, the unemployment rate in the United States jumped by 9.8 percentage points, while the number of unemployed people increased by 15.2 million, according to data the Bureau of Labor Statistics released in May. Industries such as hospitality, restaurants and bars, media, manufacturing and healthcare have all been hit hard. Boeing said it would shed 13,000 jobs. Ride hailing firm Uber has cut more than 6,000 positions as it tries to stay afloat amid depressed demand for its ride hailing service.

Many of those departing employees will not leave empty handed, experts warn. “We’ve seen an enormous spike in exfiltrated data,” said Joe Payne of the firm Code 42.

Even before the COVID pandemic took hold, employees were prone to take files and other company data with them when they left an employer, Payne said in a phone interview. “People today really believe that the work they created at their job, they own,” he told me. Data compiled by Code42 found that more than two thirds of information security workers (71%) and a similar share of business decision makers believed that they own their work products. “It’s not corporate data; it’s my work and my ideas,” Payne said, describing the thinking of these employees.
Advertisement

Occasionally, such activity rises to the level of a crime. In October, 2019, a federal judge in Chicago sentenced 59 year-old Robert O’Rourke of Geneva Wisconsin to a year in federal prison and $100,000 in fines for stealing trade secrets from Dura-Bar’s network, a manufacturer of continuous cast-iron products. Prior to the theft, O’Rourke, a 30 year employee of the company, had taken a job with a Dura-Bar rival in Jiangsu, China.


The changes that arrived with COVID have amplified that behavior. First, the closure of corporate offices and the transition to working from home blinded corporate security teams to what their employees were doing - at least temporarily.

The first thing we noted as COVID hit was a surge in VPN activity,” said Shareth Ben, the Executive Director of Field Engineering at the firm Securonix. While that is not surprising, it has required corporate security operations to relax security controls to enable that remote work, Ben said. That has meant a loss of visibility.

Take printing: corporate policy pre-COVID may have blocked local printing of corporate documents. In recent months, those kind of restrictions have had to be relaxed at many organizations to accomodate prolonged remote working. Unfortunately, that has opened the door to data exfiltration. Internet based printing services like HP ePrint or Apple AirPrint, for example, allow users to transmit a local document to a remote, Internet based printer. Corporate documents transmitted from an employee’s home network to a remote, Internet print service will likely escape notice by security monitoring tools designed to secure corporate networks. “That may not be malicious activity, but it is a gap in visibility,” Ben said.

COVID’s Double Whammy

While many employees take data with them when they leave, the layoffs that have accompanied the COVID-driven economic contraction have exacerbated an existing problem. First, because laid off employees are more likely to make off with data. “When people are laid off, they’re angry,” Payne explained. “It wasn’t their decision to leave.” Which coupled with the normal tendency to take home 'their work' the risk is compounded.
Advertisement
The sheer volume of layoffs has also posed a challenge, compacting a year or more of attrition into the space of a single day. “We had a client who laid off 17% of their workforce,” Payne said. “That’s typically what you’d see in an entire year in the high tech space.”

Payne said that his company has seen so much data moving following layoffs that it has had to adapt its technology to “work through it all” and pick the egregious behavior out from more innocuous data transfers.

Nothing says “I’m Leaving” like a ZIP File

Payne and Ben say that companies can prevent inadvertent data theft by making it clear to employees up front that all their work belongs to the company and that security operations monitors data flows and transfers.

But companies also need to monitor employee behavior over time to spot changes that may indicate an employee is getting ready to leave. Signs include a sudden expansion in the kinds of systems and files the employee is accessing, or the creation of ZIP and other file archives, which are often used to transfer large numbers of documents, but are a rarity under normal work conditions.

Most data theft is not malicious, but evidence of people making “poor decisions,” Payne said. “You don’t want to get in the way of (employees) being productive, Payne said. “But you don’t want them to do dumb things.”

1 Outlaw USB Sticks @Office - But Hey the Barn Doors Have Been Open for Months Now

2. Know your data and inventory

3. Constantly update, monitor and manage your accessibility processes.

4. Stay in tune with HR developments and processes of departing and potential higher risk associates


Article originally published on forbes.com


 



Advertisement