The Insider Threat

Insider Threats: A Major Security Risk for Many Organizations

Let's Talk Insider Threat Management

Recognise and Remediate the Many Egos of Insider Threats

Over 90% of cyber security incidents are linked to people.

So why are organizations only paying lip service to human cyber risk? Why are tick-box training and phishing simulations still used? How can we make meaningful progress to quantify human cyber risk and change security behaviors?

An insider is defined as someone who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets for unauthorised purposes. An insider could be a full time or part-time employee, a contractor or even a business partner. An insider could deliberately seek to join your organisation to conduct an insider act, or may be triggered to act at some point during their employment.

Employees may also inadvertently trigger security breaches through ignorance of rules, or deliberate non-compliance (due to pressure of work).

In a recent survey, “employees” topped the list of actors that companies are most concerned about exposing their organization to risk—both knowingly and unknowingly. Insider threats pose significant risks to businesses. Whether caused by carelessness or malicious intent, insider threats can be mitigated. To truly understand the risk of insider threats, one must first know the different forms that they can take.

They can be categorised as:

  • disgruntled employees,
  • corporate spies,
  • accidental exposures,
  • outgoing employees,
  • fraudsters

each of which has unique motivations and behaviour patterns.

Policy development and understanding, effective awareness training and the right technical controls are paramount, particularly in highly regulated sectors processing and storing sensitive or highly confidential data. These need to:

  • Reduce the risk of recruiting staff who are likely to present a security concern
  • Minimise the likelihood of existing employees becoming a security concern
  • Reduce the risk of insider activity, protect the organisation’s assets and, where necessary carry out investigations to resolve suspicions or provide evidence for disciplinary procedures
  • Implement security measures in a way that is proportionate to the risk, such as monitoring

 

 

 

 

 

 

Download Cybsafe's Human Risk Management Guide here

To find out more about how we can resolve your IT issues please email or call us:

Send us an email Call us +44 (0)1462 416400
Latest News
It happens in many different forms, but the most common is through an email ...Read More
It’s currently riding waves; infiltrating the remote work space. ...Read More
If you are not careful, hackers will find ways to infiltrate your syst...Read More
They tell you that one of your employees' email accounts has been hacke...Read More

You need an account to download info please sign in or sign up

The above information will only be used to answer your query as you have detailed. We would really like to keep you informed with other information we feel is relevant to your business. If you’re happy to hear from us about other products and services then please select your preferences:

By checking one or more of these options and by submitting your email address, you acknowledge that you have read our Privacy Statement and that you consent to our processing data in accordance with the Privacy Statement (including international transfers). If you change your mind at any time about wishing to receive information from us, you can send us an email message using the Contact Us page, or click on Unsubscribe on any communication.