TechnoSports Media Group
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
TechnoSports Media Group
No Result
View All Result

Dissecting Insider Threats in Cyber Security by Filip Cotfas, Channel Manager, CoSoSys

Rahul Roy by Rahul Roy
November 11, 2020
in Technology
1

Insider threats are a major and increasing problem for organizations, as the human factor is often the most difficult to control and predict when it comes to data security and protection. With digitization, the amount of digital data is growing exponentially, and together with this, the number of systems and human interactions with the data is increasing too. More interaction involves exposing the data to more security vulnerabilities.

The potential risks of insider threats are numerous, including financial fraud, data corruption, theft of valuable information, and installing malware. These incidents can lead to data breaches that expose sensitive information such as Personally Identifiable Information (PII) or Intellectual Property (IP) and can result in high fines while detecting them is not an easy task for security teams.

RelatedPosts

The BEST Google Play Redeem Codes as of November 2025

Midas buy Redeem Codes Free UC and Skins in 2025: Check Out All Details

NEW Google Play Store Redeem Codes for Free in 2025

What are insider threats in cybersecurity?

Insider threats are cybersecurity risks originating within the organization itself. They can be caused by users with legitimate access to the company’s assets ñ including current or former employees, contractors, business partners, third-party vendors, etc. Insiders can vary significantly in awareness, motivation, intent, and access level.

Traditional security measures such as firewalls or antivirus systems focus on external threats and are not always capable of identifying threats emanating from inside the organization. Besides being invisible to traditional security solutions, insider attacks can be harder to detect or prevent than outside attacks and go unnoticed for months or years.

Types of Insider Threats

Malicious insider or Turncloak: This is someone who uses their access privilege to exfiltrate or steal data and use it with the goal of personal or financial gain. Malicious insider threats include accessing and disclosing confidential information without authorization, carrying out fraudulent transactions, and sabotaging the organizationís systems, network, or data. Departing and disgruntled employees, as well as those with high-level access, can cause these types of incidents.

Negligent insider or Pawn: A negligent or careless insider has no malicious intent but mistakenly gives away sensitive data or inadvertently puts company data at risk. These threats include misusing assets, mishandling data, and installing unauthorized applications (shadow IT). Negligent insiders may be well-intentioned, but they can become victims of phishing attacks or social engineering.

Collusive insiders: This type will collaborate with malicious external threat actors to compromise the organization. These cases usually involve fraud, data theft, or a combination of the two. Although it is the rarest form of criminal insider risk, it can still come with high costs.

The most common type of insider threat is a negligent employee or contractor, while the most costly incidents threats were credential thefts.

Insider threat motivations

Motivations can vary and malicious insiders might act out of a grudge towards their employer, might simply want money, or it could be an act of corporate or nation-state espionage. Unintentional insider threats could happen due to a lack of knowledge, out of curiosity, or convenience as well as misplaced technology. By understanding the motivations, security teams can be more proactive in their approach to insider threat defense.

Insider threats in the era of work from home

The coronavirus pandemic has set the remote work revolution on a fast track, and many companies have been forced to shift to work from home policies and enabling remote staff overnight.

Remote work is opening up new insider security threats, and companies are scrambling to keep up with these unprecedented risks. The new norm of remote work means no face-to-face supervision and little to no training for handling new security risks. Employees can also face more distractions in their home settings, coupled with the overlying stress of the pandemic and regular work pressure. Accidental disclosures can easily happen, as the lines between work and home, professional and family are more blurred than ever.

Remote working can also offer many data theft opportunities, including the loss or unlawful appropriation of physical devices, the possibility of sharing passwords, encryption keys, and company laptops with unknown third parties.

Employees can accidentally share a customer database, intentionally disclose a trade secret or share Social Security numbers in the public cloud. The increased data portability is another threat factor, posing a high risk of data loss or theft. Employees working from home can easily transfer, share or remove data, and cause the organization to lose revenue, get a penalty for non-compliance or damage the reputation.

Thus, working remotely, especially for organizations with no solid remote work plans, means that their assets and confidential data are more vulnerable during the global pandemic. Implementing the right tools and technologies and paying closer attention to company data can decrease the risk of cyber incidents.

Common types of insider attacks

These are the most prevalent internal incidents and practices that represent a threat to a company’s data security.

Social engineering

Recognized as one of the biggest security threats facing companies, social engineering is a malicious threat that implies human interaction. Usually, it involves tricking someone inside the organization to make a security mistake or reveal sensitive information. Social engineering attacks have different forms, including phishing and baiting. Malicious actors who engage in social engineering manipulate human feelings, such as curiosity or fear, and compromise their targetsí information.

Data sharing outside the company

Employees sharing confidential data, either publicly or with unauthorized third parties, can cause serious problems. This type of incident usually happens out of carelessness: information is sent to the wrong email address, a reply all button is hit instead of a simple reply, confidential data is accidentally posted publically.

Shadow IT

The use of unauthorized devices, software, applications, and services in the workplace is often hard to trace by IT departments and this is where the term shadow IT comes from. While it can improve productivity and drive innovation, shadow IT also poses a serious threat to data security and can lead to data leaks, compliance violations, and more.

Use of unauthorized devices

With the rise of Bring-Your-Own-Device (BYOD) policies and the proliferation of mobile devices, organizations encounter many internal security problems, including the risk of losing data due to employee negligence or malicious intentions. Portable devices and USBs, in particular, although convenient to use, are easy to lose or steal. Thus negligence can easily lead to disastrous data breaches, such as the infamous Heathrow Airport security incident in which a careless employee lost a USB device with over 1,000 confidential files.

Physical theft of company devices

Nowadays, it is becoming increasingly common that employees take their work computers or portable devices out of the office. This can happen for several reasons, including remote work, attending an industry event, or visiting a client. By leaving the security of company networks, work devices become more vulnerable to physical theft and outside tampering.

Do check out:

https://technosports.co.in/2020/11/10/cososys-prepares-to-launch-its-endpoint-protector-enterprise-package-in-india/
Tags: CoSoSysCyber SecurityFilip CotfasInsider Threats
Previous Post

ISL 2020-21: All you need to know before the tournament starts on 20th November

Next Post

Aya Neo Founder Edition powered by AMD’s Ryzen 5 4500U APU

Related Posts

FAQ

The BEST Google Play Redeem Codes as of November 2025

November 2, 2025
FAQ

Midas buy Redeem Codes Free UC and Skins in 2025: Check Out All Details

November 2, 2025
NEW Google Play Store Redeem Codes for Free in 2024
FAQ

NEW Google Play Store Redeem Codes for Free in 2025

November 2, 2025
SmartPhones
FAQ

November 2025 Upcoming SmartPhones: Flagship Showdown Featuring Nothing, OnePlus, Oppo, Realme & iQOO

November 1, 2025
Snapdragon 7+ Gen 3 vs. Dimensity 8300: Who wins in 2025?
Technology

Snapdragon 7+ Gen 3 vs. Dimensity 8300: Who wins in 2025?

November 1, 2025
Technology

Lava ProBuds N33 Launched at ₹1,299 with 30dB ANC & 40H Battery

November 1, 2025
Next Post

Aya Neo Founder Edition powered by AMD's Ryzen 5 4500U APU

Comments 1

  1. Avatar of Andy Houghton Andy Houghton says:
    5 years ago

    We made this video about Fraud and Social Engineering https://youtu.be/NMHxFLWF75w and thought it might be interesting to you and your readers.

    You can skip to the Social Engineering section using the time codes in the description.

    We also made videos on Spotting Phishing Emails, and Social Media and Work which are on the Showreel page of our website here: https://whatyouneedtoknow.co.uk/showreel

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Buy JNews
  • Support Forum
  • Pre-sale Question
  • Contact Us
Call us: +1 234 JEG THEME
No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment

© 2025 TechnoSports Media Group - The Ultimate News Destination