6 Types of Insiders that Could Be Working for You

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next 6 Types of Insiders that Could Be Working for You-5 Next

The Compromised Consultant (Code and Intellectual Property Thief)

Your trusted consultant gets into financial trouble after losing a large amount of money. This consultant is targeted by an organized crime network because of his technical position of trust, which is publicly accessible via their LinkedIn profile. The blackmailer may pose as a technical recruiter and convince that person to steal sensitive PII information that can be sold through the black market. After your consultant finds vulnerable information to exploit, he will become more confident and aggressive about stealing information. Eventually he will become sloppy and prepare to resign to avoid being caught.

Indicators: May exhibit signs of financial instability (i.e., gambling) outside of work environment, abnormally high level of downloads or copies of documents not associated with role or department.

Insider threats are the underappreciated threat. They fly under the radar as stories about hackers get top billing. Insider attacks are more insidious because they betray the trust the company has in its employees, partners and systems. Insider threats are the hardest to detect and take longer to discover than any other threats, according to the most recent Verizon Data Breach Report. Insider threats range across types and include: intentional data theft as in the Morgan Stanley breach; possible insider trading, like that recently seen in the LinkedIn acquisition; garden variety employee mistakes, such as the Google insider data breach; and ex-employees accused of taking trade secrets, as alleged in an IBM lawsuit. And then there are the active efforts by criminals to recruit insiders on the Dark Web or nation-state espionage that takes the form of phishing emails or bribed insiders.

The insider threat is not really a cybersecurity problem or a data analytics issue; it's a human risk problem that can only be solved by understanding how people think and behave. In this slideshow, RedOwl has applied the science of risk assessment to employee behavior and come up with six persona types of employees who represent insider threat risks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.