TechnoSports Media Group
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
TechnoSports Media Group
No Result
View All Result

Dissecting Insider Threats in Cyber Security by Filip Cotfas, Channel Manager, CoSoSys

Rahul Roy by Rahul Roy
November 11, 2020
in Technology
1

Insider threats are a major and increasing problem for organizations, as the human factor is often the most difficult to control and predict when it comes to data security and protection. With digitization, the amount of digital data is growing exponentially, and together with this, the number of systems and human interactions with the data is increasing too. More interaction involves exposing the data to more security vulnerabilities.

The potential risks of insider threats are numerous, including financial fraud, data corruption, theft of valuable information, and installing malware. These incidents can lead to data breaches that expose sensitive information such as Personally Identifiable Information (PII) or Intellectual Property (IP) and can result in high fines while detecting them is not an easy task for security teams.

RelatedPosts

Cognizant Adopts Anthropic’s Claude: 350,000 Employees to Drive AI Transformation

Unix introduces two vintage car-shaped Bluetooth speakers – Capri 52 and Pontiac 34

Amazon Gift Card Codes: Free Gift Card as of November 2025 

What are insider threats in cybersecurity?

Insider threats are cybersecurity risks originating within the organization itself. They can be caused by users with legitimate access to the company’s assets ñ including current or former employees, contractors, business partners, third-party vendors, etc. Insiders can vary significantly in awareness, motivation, intent, and access level.

Traditional security measures such as firewalls or antivirus systems focus on external threats and are not always capable of identifying threats emanating from inside the organization. Besides being invisible to traditional security solutions, insider attacks can be harder to detect or prevent than outside attacks and go unnoticed for months or years.

Types of Insider Threats

Malicious insider or Turncloak: This is someone who uses their access privilege to exfiltrate or steal data and use it with the goal of personal or financial gain. Malicious insider threats include accessing and disclosing confidential information without authorization, carrying out fraudulent transactions, and sabotaging the organizationís systems, network, or data. Departing and disgruntled employees, as well as those with high-level access, can cause these types of incidents.

Negligent insider or Pawn: A negligent or careless insider has no malicious intent but mistakenly gives away sensitive data or inadvertently puts company data at risk. These threats include misusing assets, mishandling data, and installing unauthorized applications (shadow IT). Negligent insiders may be well-intentioned, but they can become victims of phishing attacks or social engineering.

Collusive insiders: This type will collaborate with malicious external threat actors to compromise the organization. These cases usually involve fraud, data theft, or a combination of the two. Although it is the rarest form of criminal insider risk, it can still come with high costs.

The most common type of insider threat is a negligent employee or contractor, while the most costly incidents threats were credential thefts.

Insider threat motivations

Motivations can vary and malicious insiders might act out of a grudge towards their employer, might simply want money, or it could be an act of corporate or nation-state espionage. Unintentional insider threats could happen due to a lack of knowledge, out of curiosity, or convenience as well as misplaced technology. By understanding the motivations, security teams can be more proactive in their approach to insider threat defense.

Insider threats in the era of work from home

The coronavirus pandemic has set the remote work revolution on a fast track, and many companies have been forced to shift to work from home policies and enabling remote staff overnight.

Remote work is opening up new insider security threats, and companies are scrambling to keep up with these unprecedented risks. The new norm of remote work means no face-to-face supervision and little to no training for handling new security risks. Employees can also face more distractions in their home settings, coupled with the overlying stress of the pandemic and regular work pressure. Accidental disclosures can easily happen, as the lines between work and home, professional and family are more blurred than ever.

Remote working can also offer many data theft opportunities, including the loss or unlawful appropriation of physical devices, the possibility of sharing passwords, encryption keys, and company laptops with unknown third parties.

Employees can accidentally share a customer database, intentionally disclose a trade secret or share Social Security numbers in the public cloud. The increased data portability is another threat factor, posing a high risk of data loss or theft. Employees working from home can easily transfer, share or remove data, and cause the organization to lose revenue, get a penalty for non-compliance or damage the reputation.

Thus, working remotely, especially for organizations with no solid remote work plans, means that their assets and confidential data are more vulnerable during the global pandemic. Implementing the right tools and technologies and paying closer attention to company data can decrease the risk of cyber incidents.

Common types of insider attacks

These are the most prevalent internal incidents and practices that represent a threat to a company’s data security.

Social engineering

Recognized as one of the biggest security threats facing companies, social engineering is a malicious threat that implies human interaction. Usually, it involves tricking someone inside the organization to make a security mistake or reveal sensitive information. Social engineering attacks have different forms, including phishing and baiting. Malicious actors who engage in social engineering manipulate human feelings, such as curiosity or fear, and compromise their targetsí information.

Data sharing outside the company

Employees sharing confidential data, either publicly or with unauthorized third parties, can cause serious problems. This type of incident usually happens out of carelessness: information is sent to the wrong email address, a reply all button is hit instead of a simple reply, confidential data is accidentally posted publically.

Shadow IT

The use of unauthorized devices, software, applications, and services in the workplace is often hard to trace by IT departments and this is where the term shadow IT comes from. While it can improve productivity and drive innovation, shadow IT also poses a serious threat to data security and can lead to data leaks, compliance violations, and more.

Use of unauthorized devices

With the rise of Bring-Your-Own-Device (BYOD) policies and the proliferation of mobile devices, organizations encounter many internal security problems, including the risk of losing data due to employee negligence or malicious intentions. Portable devices and USBs, in particular, although convenient to use, are easy to lose or steal. Thus negligence can easily lead to disastrous data breaches, such as the infamous Heathrow Airport security incident in which a careless employee lost a USB device with over 1,000 confidential files.

Physical theft of company devices

Nowadays, it is becoming increasingly common that employees take their work computers or portable devices out of the office. This can happen for several reasons, including remote work, attending an industry event, or visiting a client. By leaving the security of company networks, work devices become more vulnerable to physical theft and outside tampering.

Do check out:

https://technosports.co.in/2020/11/10/cososys-prepares-to-launch-its-endpoint-protector-enterprise-package-in-india/
Tags: CoSoSysCyber SecurityFilip CotfasInsider Threats
Previous Post

ISL 2020-21: All you need to know before the tournament starts on 20th November

Next Post

Aya Neo Founder Edition powered by AMD’s Ryzen 5 4500U APU

Related Posts

Cognizant Adopts Anthropic's Claude
Recent News

Cognizant Adopts Anthropic’s Claude: 350,000 Employees to Drive AI Transformation

November 4, 2025
Unix introduces two vintage car-shaped Bluetooth speakers - Capri 52 and Pontiac 34
Technology

Unix introduces two vintage car-shaped Bluetooth speakers – Capri 52 and Pontiac 34

November 4, 2025
via- https://giftcardonline.in/product/amazon-pay-giftcard/
Application

Amazon Gift Card Codes: Free Gift Card as of November 2025 

November 4, 2025
How to Cancel Jio Fiber Connection
FAQ

How to Cancel Jio Fiber Connection: Official Process in 2025

November 4, 2025
FAQ

The BEST Google Play Redeem Codes as of November 2025

November 4, 2025
Technology

CORSAIR AIR 5400: Triple-Chamber Case Redefines PC Cooling

November 4, 2025
Next Post

Aya Neo Founder Edition powered by AMD's Ryzen 5 4500U APU

Comments 1

  1. Avatar of Andy Houghton Andy Houghton says:
    5 years ago

    We made this video about Fraud and Social Engineering https://youtu.be/NMHxFLWF75w and thought it might be interesting to you and your readers.

    You can skip to the Social Engineering section using the time codes in the description.

    We also made videos on Spotting Phishing Emails, and Social Media and Work which are on the Showreel page of our website here: https://whatyouneedtoknow.co.uk/showreel

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

TechnoSports Media Group

© 2025 TechnoSports Media Group - The Ultimate News Destination

Email: admin@technosports.co.in

  • Terms of Use
  • Privacy Policy
  • About Us
  • Contact Us

Follow Us

No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment

© 2025 TechnoSports Media Group - The Ultimate News Destination