Earlier this month, Avalon Cyber posted a poll on LinkedIn asking, “What cybersecurity threat keeps you up at night?” The choices were: external threat (for example, ransomware), internal threat (i.e., IP theft), or the birth of GenAI.
82% of respondents were most worried about external threats and 18% were concerned with GenAI; however, and somewhat surprisingly to our consultants, none of the respondents chose Internal threats as a major concern.
While external threats and artificial intelligence development and use are definitely areas that should be on a company’s (and its security team’s) radar, insider threats must not be ignored.
Here are a few stats to prove their significance:
A recent article from CSO Online reminds us of the insider threat aspect and the related management of insider risk. It states that “Chief information security officers (CISOs) focus predominantly on technologies: user entity behavior analytics (UEBA), security information and event management (SIEM), data loss prevention, and the like. There isn’t as much emphasis on stepping outside the view of their colleagues as streams of user data, to instead see them as people with complex lives and various pressures placed upon them.”
While this article explores a variety of insider risks, opportunities, and ways to help avoid such incidents from a CISO’s standpoint, everyone should heed their advice. In particular, to watch for employees who exhibit signs of dissatisfaction surrounding things like compensation, benefits, opportunities for promotion, and performance feedback. The article also mentions that Pew Research has found that the more interaction between workers and managers and the more feedback given equates to greater job satisfaction, i.e., that employee presents a much lower risk of dissatisfaction and, therefore, becoming a threat.
Making employees happy is an excellent way to ensure your organization thrives, and hopefully, your company does all it can to show appreciation and concern for your most important asset: your people. But, as we all know, you can’t please everyone. So, how do you know if there’s nefarious activity happening within your company’s environment?
Signs of insider threats include:
If you witness any of these indicators of IT sabotage or data theft, you need to take immediate action by reporting it to a manager or supervisor. If you see something, say something.
How to prevent insider attacks
Here are a few best practices to implement to keep your company’s data safe from insider threats:
Your organization must be prepared to identify both data driven and human signals of potential concerns, and we hope this article has provided some helpful information. If you have questions or concerns about insider threats, contact our team of battle-tested experts today.
Download our white paper – “7 Ways Employees Put Corporate Data at Risk” – to discover a few surefire employee behaviors that will put your company’s data at risk.
Resources:
https://www.ekransystem.com/en/blog/insider-threat-definition
https://www.redscan.com/solutions/insider-threats-cyber-security/
https://www.ibm.com/topics/insider-threats
https://www.lepide.com/blog/best-practices-to-prevent-insider-threats/