6 Types of Insiders that Could Be Working for You

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next 6 Types of Insiders that Could Be Working for You-7 Next

The Planted Insider (Intellectual Property Thief)

This employee quickly made VP and was well-respected across the company. One day at a conference, he was approached and struck up a conversation with an individual from another country who'd recently moved to London and noticed his name tag. They began having coffee on a fairly regular basis. With your employee's help, this foreigner lands an entry-level position on the equities trading floor. The two kept in touch and then your employee began to have doubts about him.

Indicators: Communicates primarily with external contacts, clearly motivated by money and willing to skirt the rules to get ahead.

Insider threats are the underappreciated threat. They fly under the radar as stories about hackers get top billing. Insider attacks are more insidious because they betray the trust the company has in its employees, partners and systems. Insider threats are the hardest to detect and take longer to discover than any other threats, according to the most recent Verizon Data Breach Report. Insider threats range across types and include: intentional data theft as in the Morgan Stanley breach; possible insider trading, like that recently seen in the LinkedIn acquisition; garden variety employee mistakes, such as the Google insider data breach; and ex-employees accused of taking trade secrets, as alleged in an IBM lawsuit. And then there are the active efforts by criminals to recruit insiders on the Dark Web or nation-state espionage that takes the form of phishing emails or bribed insiders.

The insider threat is not really a cybersecurity problem or a data analytics issue; it's a human risk problem that can only be solved by understanding how people think and behave. In this slideshow, RedOwl has applied the science of risk assessment to employee behavior and come up with six persona types of employees who represent insider threat risks.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.