GuardWare INSIGHT alerted the IT Security officer of a manufacturer that a computer in the assembly area of their factory had an unknown network installed on one of their manufacturing machines.
The company produces a range of technologically advanced electronics in a highly competitive market and, having been in business for decades, took their security very seriously.
Administrator rights had inadvertently been left applied to the machine. Security discovered that an employee had used system roll-back during this period, in an attempt to remove the GuardWare INSIGHT Agent from the system. The change alert was received on a Friday afternoon and Security continued to monitor the machine.
Over the weekend, a second network was installed on the machine, evidently in preparation to exfiltrate information that was due to be sent to that machine as part of the coming weeks manufacturing activities.
The perpetrator was duly identified, and further actions were taken.
Risks mitigated by GuardWare INSIGHT
Unrestricted Administrator Privileges Unrestricted access to Administrator privileges allows users to engage in Shadow Computing, involving the installation of software (and sometimes even hardware) to bypass security controls. Shadow computing raises the risks of malware, malicious intrusions and the loss of intellectual property.
Unauthorised Access by Rogue Employees Unauthorised networks are used by rogue employees to bypass network security and provide a conduit for data theft. Since IT typically has no awareness of these clandestine networks, they are unable to police them or monitor traffic.
Unauthorised Access by individuals outside the organisation Wi-Fi networks are frequently visible outside of the organisation's physical property line. Malicious Actors can gain access to the organisations network assets without entering the premises, most often by simply parking on the street outside. Typically, access is gained out of hours, when the chance of detection is minimal and perpetrators are able to quickly depart if threatened with discovery.
Malicious Access by Ex-Staff Rogue networks are sometimes installed by departing staff to provide them with continued access to organisational assets after their departure. The additional risk presented is for destructive attacks on the network or data...attacks that would be difficult to either defend against or attribute back to the perpetrator.
Get a Data Security Assessment
We Guarantee Results, through
our 3 week Risk Assessment
process.
If we don’t find any serious cyber risks or incidents, we’ll refund your investment.
When confronted by the IT team, the employee initially claimed to have returned the company USB, unaware that INSIGHT had logged his use of a personal USB as well.
SharePoint Malicious mass downloads from Sensitive Folder to user’s personal
device.
INSIGHT flagged this suspicious activity, and an investigation confirmed that the data had indeed been transferred.
SharePoint Exposure of Customer Data by Law firm – Human Error
In response to this breach, the firm reconfigured INSIGHT to send high-priority alerts directly to both IT personnel and the individual users responsible for risky actions.
Stored Passwords detected by INSIGHT by Company’s MSP having admin rights.
GuardWare INSIGHT’s data discovery scan detected the stored password file, prompting immediate deletion.
Scans revealed stored Customer data including bank account info in AWS DevOPs environment.
GuardWare ASSESSOR revealed stored customer data in log files on developers’ devices and in their AWS environment, as well as the unsafe sharing practices.
Outsource Developers of a financial institution detected exposing Financial APPs source code and company’s IP.
With INSIGHT, they can safely re-enable forum access, confident that any unauthorized source code postings will be promptly detected and addressed.
Productivity Monitoring WFH compared with Office
To address these concerns, the company deployed GuardWare INSIGHT’s productivity monitoring features to track work behaviors accurately.
Rogue Network
Security discovered that an employee had used system roll-back during this period, in an attempt to remove the GuardWare INSIGHT Agent from the system.
Dangers of using Cloud Storage Services and Website Transfers
GuardWare INSIGHT monitors and prevent unauthorized file uploads across cloud, web, email, and chat applications, ensuring their data stays secure and compliant.
Corporate Email Risk - Email forward to user’s Personal Email resulted in serious theft of sensitive PII data
GuardWare INSIGHT flagged the incident. The software’s AI detected the email forward to a personal account and scanned the attached file, identifying the sensitive content.
WFH Risks including VPN misuse
investigation with GuardWare INSIGHT revealed that users were frequently turning the VPN on and off. The university adjusted the configuration to ensure the VPN remains active at all times.
Malicious Insider in a Recruitment Firm – Data exfil by a Director
GuardWare INSIGHT showed that the data exfiltration occurred while the user was connected to the company’s Wi-Fi, proving the laptop was in his possession at the time.