Your Biggest Threat Might Be Sitting Right Next to You 

When you think “cybersecurity threat,” what comes to mind? A hoodie-clad hacker in a basement breaking into the network or an army of cyberattackers sending ransomware at other unsuspecting nations? Probably. But the truth is, many incidents can actually start from inside your customers’ organization. This closer-to-home danger is called the insider threat, defined by the Department of Homeland Security as “a current or former employee, contractor, or other business partner who has or had authorized access to an organization’s network, system, or data.” Insiders have more access to company information than an external attacker, which means extra care is necessary to reduce risk.

Intention Aside

Insider threat incidents are on the rise, and can be either intentional or unintentional.

Remember Dennis Nedry from Jurassic Park? He’s a textbook example of an intentionally malicious insider: a disgruntled employee who steals Intellectual Property (IP) and disrupts business operations. Other examples include employees stealing the company’s CRM, financials, or other sensitive information, deleting or altering data, or installing malware.

But insider threats aren’t always from predators – they can also be unintentional, caused by a simple mistake, poor judgement call, or negligence by a well-meaning employee or contractor. Consider these real-life scenarios:

  • Sales representative emails a proposal to the wrong person by selecting the wrong name auto-populated in the email program, revealing privileged pricing and client information
  • Contractor accesses the company network, unaware they have malware on their device that infects the network
  • Accountant loses a USB drive loaded with sensitive financial documents
  • HR manager leaves a personnel file on their desk, and it’s seen by after-hours maintenance staff
  • CEO falls for a sophisticated whaling scheme, providing credentials, confidential information, or payment to an attacker

Your Role in Minimizing the Insider Threat

While your customers likely won’t have dinosaurs to contend with, the insider threat is still something to take seriously. Help your customers reduce their risk with these considerations:

  • Cyber-Smart Culture: Educate employees on the realities of insider threats and encourage them to speak up if they recognize one. Maintain an ongoing training program to keep awareness high and the team on board.
  • Network Infrastructure: Employ the least privilege principle, only giving employees access to files necessary for their job.
  • Policies and Enforcement: Help set and enforce rules with a Technology and Data Use policy detailing how data is stored and shared. For example, if your customers don’t allow USB drives, set up peripheral control to block them from company devices.
  • Onboarding and Offboarding: Consider recommending background checks for all new employees and contractors. When employees leave, follow documented offboarding procedures to remove access promptly.

Set a Good Example

You may not have considered that your organization may qualify as an insider threat to your customers due to your level of access. Discuss the [steps you take]( to protect their information and encourage them to ask their other vendors and contractors to do the same.

The insider threat isn’t going extinct any time soon, but a few steps can help keep your customers protected from the inside out.

Stay Safe,

Your Friends @ Defendify

Resources & insights

Why You Could Be Denied Cyberattack Insurance Coverage
Why You Could Be Denied Cyberattack Insurance Coverage
As you’re working toward achieving robust cybersecurity, the subject of cyber attack insurance coverage and cybersecurity insurance requirements is sure to enter the discussion.
Cost of a Cyberattack vs. Cybersecurity Investment
Cost of a Cyberattack vs. Cybersecurity Investment 
Detailing the cost of a cyberattack versus the ROI of a cybersecurity investment enables leadership to see cybersecurity solutions are worth it.
Defendify Listed as a High Performer in Six G2 Grid Categories
Defendify Listed as a High Performer in Six G2 Grid Categories
The Defendify Cybersecurity Platform has been listed as a High Performer in six Summer 2022 Data Security Software Category Reports on the technology review site G2.

Protect and defend with multiple layers of cybersecurity

Defend your business with All-In-One Cybersecurity®.

Explore layered

Learn more about Defendify’s three key layers and All-In-One Cybersecurity®.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.

Take the first step toward comprehensive cybersecurity with a free Defendify Essentials package

Gain access to 3 award-winning cybersecurity modules. Nothing to install. Nothing to pay for.