6 Types of Insiders that Could Be Working for You

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next 6 Types of Insiders that Could Be Working for You-6 Next

The Activist (Media Leaker)

A top performer, this insider will become privy to some internal communications of corporate executives about compensation. Through chats and emails that were mistakenly shared, she learns about helicopter rides and extravagant dinners on the company dime, sees conversations about whether to fire mid-level managers who didn't seem smart enough, and even disparaging and sexist remarks about a female admin assistant. This employee gets frustrated and decides she’s had enough. She shifts her hours so she can surreptitiously document her colleague's comments over a period of weeks or months. When she’s ready to quit, she’ll take the dirt and send it straight to a national media publication.

Indicators: May appear to be stressed or depressed. Seeks access to sensitive company information, is active on servers at unusual hours, and shows a spike in downloading activity.

Insider threats are the underappreciated threat. They fly under the radar as stories about hackers get top billing. Insider attacks are more insidious because they betray the trust the company has in its employees, partners and systems. Insider threats are the hardest to detect and take longer to discover than any other threats, according to the most recent Verizon Data Breach Report. Insider threats range across types and include: intentional data theft as in the Morgan Stanley breach; possible insider trading, like that recently seen in the LinkedIn acquisition; garden variety employee mistakes, such as the Google insider data breach; and ex-employees accused of taking trade secrets, as alleged in an IBM lawsuit. And then there are the active efforts by criminals to recruit insiders on the Dark Web or nation-state espionage that takes the form of phishing emails or bribed insiders.

The insider threat is not really a cybersecurity problem or a data analytics issue; it's a human risk problem that can only be solved by understanding how people think and behave. In this slideshow, RedOwl has applied the science of risk assessment to employee behavior and come up with six persona types of employees who represent insider threat risks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.