Free Guide
16 Questions You MUST Ask Before Hiring Any IT Company
The post-pandemic era can aptly be described as a golden era for cybercriminals, with a monumental rise in the number of cybercrimes across the globe. Cybercrime gangs are firing on all cylinders, launching a barrage of sophisticated cyber threats that cause significant damage to organizations of every size across all sectors. But some threats are grown a little closer to home. In a recent survey by Cybersecurity Insiders, more than 60% of companies experienced an insider attack in 2022, and many of those attacks had expensive, damaging outcomes. Three-quarters of survey respondents said they feel moderate to highly vulnerable to insider threats, an increase of 8% over 2021. Every business needs to address the growing problem of insider risk immediately.
Malicious insider threats aren’t the most significant cyberattack vector for businesses. In the 2022 Unit 42 Incident Response Report by the Palo Alto Networks, insider attacks comprised only 5.4% of the reported incidents. However, even this tiny percentage made a more significant dent for organizations as insiders have a better understanding of sensitive data and have access to privileged information. That small percentage of reported incidents can lead to substantial damage fast. According to Verizon’s 2022 Data Breach Investigations Report, malicious employees are behind about 20% of data breaches. The attacks that insiders are involved in are, on average, ten times bigger than those conducted by external actors.
A recent example of how much damage a malicious insider can do quickly helps illustrate the danger. In November 2022, news broke out about a hacker group, WhiteInt, whose mastermind was an associate director at Deloitte’s cyber unit. The hacker group had operations across India and offered paid services of accessing emails, personal data and phone numbers of VIPs for private investigators globally. After being exposed in a sting operation conducted by The Sunday Times and the Bureau of Investigative Journalism, the mastermind Aditya Jain was terminated from Deloitte. But the damage had already been done to the company’s reputation.
Malicious insider attacks can come from anyone with the proper access to a company’s computer systems and data, including current employees, former employees, contractors, business partners or business associates, suppliers and vendors. Over 90% of malicious insider incidents are preceded by employee termination or layoff, and if that employee still has a valid access credential, they can wreak havoc quickly. Like most other cyberattacks, a malicious insider’s prime motive is financial gain. However, malicious insider threats can also result from espionage, retaliation or a grudge toward the employer. Stealing data or proprietary information is the top malicious insider action, but disgruntled employees make other damaging moves too.
However, it’s important to remember that not all insider threats are malicious attacks. Some bad outcomes, like a data breach, can happen because of employee negligence or ineptitude. Many of those threats can be neutralized through security awareness training. For example, over 65% of accidental insider threats come from employees interacting with a phishing message. But with regular exercise using phishing simulation, companies can dramatically reduce the likelihood of an employee falling for a phishing trap. Insider threats come from various employee actions and behaviours, whether malicious or accidental. Does a Gartner study classify insider threats into four categories: pawn, goof, collaborator, and lone wolf:
Source:ID Agent