The insider threat, the hardest cybercriminal to keep out

The internal “spy” – the insider threat

The hardest attack to defend against in cybersecurity.

There are three types of spy

The accidental spy – the person who thinks it is OK to bypass the security systems put in place to protect the organisation. Those who think the policies do not apply to them:

  1. I am the best sales person and those policies will slow me down,
  2. I am the CEO and I need this technology to make my job easier, less complex but it has not been tested in the organisation. “Just do it”
  3. I am the CIO and all of the other CIO’s have the newest gadget, so it must be OK

The incompetent and / or silly spy – the person who has been targeted by a social engineering attack and has fallen for the bait:

  1. Opened that email attachment, clicked that link.
  2. joined that Facebook group without checking their security settings.
  3. opened the video on Messenger
  4. Tried to win that Bunnings / Home Depot voucher

Finally we have the disgruntled or disappointed employee, the most dangerous – the destructive spy:

  1. The sales person who is leaving and takes a copy of the CRM, because they think they are entitled to it.
  2. The employee who has left who still has access to the system.
  3. The outgoing / fired IT person who has full access to the system and has put in back doors so they can continue to get in and do a number of nasty things.

Protection against the internal spy, comes down to policies, procedures and processes.

Policies are applied to all people in the organisation, if not adhered to then repercussions need to be in place

Procedures need to be created so that everyone knows, not only their own jobs, but parts of other staff members jobs as well. They need to be documented, distributed and authorized by management. But, more importantly, they need to be followed.

Processes need to be put in place to ensure that things are done and done the right way every time.

Although the insider threat is one of the hardest attack to protect against, there are still ways to reduce the risk.

If you are not sure then talk to someone who can help.

What do you think?

Am I correct?

Make a comment on this article.

Roger Smith is funny, scary, on point and is focused on one thing – increasing everyone’s awareness and understanding of the problems and issues associated with the digital world.

He was Runner up in the 2017 worldwide Cybersecurity Educator of the Year award and has been nominated for the 2018 Cybersecurity Educator of the Year award. 

He is a highly respected expert in the fields of cybercrime and business security and is a Lecturer at ADFA (UNSW – Australian Centre of Cybersecurity) on Cybercime, Cybersecurity and the hacking techniques used by the digital criminal.  

He is an Amazon #1 selling author on Cybercrime with his best selling book, Cybercrime a clear and present danger, going to number one on Amazon.  

He is the primary presenter for the Business Security Intensive (BSI) and author of the Digital Security Toolbox which is given away for free at the BSI.  He is a speaker, author, teacher and educator on Cybercrime and an expert on how to protect yourself, your staff, your clients and your intellectual property from the digital world.