Inside the Insider

By
Follow google news
Page 2 of 3  |  Single page
Inside the Insider
Some employees become malicious over time; others may be spies planted to conduct industrial espionage; while still others simply make mistakes that unknowingly put the organisation at risk.

A number of variables motivate insiders, but the end result is that they can more easily perpetrate their crimes than an outsider who has limited access.

It doesn’t take a skilled hacker to print out sensitive data, copy files to an MP3 player or send confidential information to a competitor. Because of this, anybody can become a malicious insider—from the disgruntled system administrator hoping to sabotage access to business critical systems to the human resources intern that is selling employee salary information to recruiters.

Insiders can directly damage your business resulting in lost revenue, lost customers, reduced shareholder faith, a tarnished reputation, regulatory fines and legal fees.

So what is the root cause of insider threats? In most of the cases we have investigated it has been either due to accidental data leaks that occur because employees or contractors lack sufficient knowledge about preventative measures and they are simply careless.

In addition, it could also be due to corporate sabotage such as the deliberate destruction of IT equipment which also occurs frequently because employees or contractors are malicious or disgruntled.

Our clients believe that their system admin and other privileged users appear to represent a much lower insider risk to their organisation, although they have the most access.

Add iTnews as your trusted source

Previous PageNext Page 1 2 3 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Attacker embeds Claude Code in mass credential harvesting op

Attacker embeds Claude Code in mass credential harvesting op

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Log In

  |  Forgot your password?