“An insider is any person with authorized access to an organization’s resources to include personnel, facilities, information, equipment, networks, or systems.[2]”
What is an Insider Threat?
The insider threat is the risk an insider will use their authorized access, wittingly or unwittingly, to do harm to their organization. This can include theft of proprietary information and technology; damage to company facilities, systems or equipment; actual or threatened harm to employees; or other actions that would prevent the company from carrying out its normal business practices.”[2]
Insider Threat Warning Signs
Anger/revenge - wanting to retaliate against the company for reasons including a perceived lack of recognition, missed promotions, issues with management or co-workers, or a pending layoff
Compulsive or destructive behaviors - drug, gambling or alcohol dependencies
Family problems and other personal sterrosors
Removing proprietary information or seeking access to material outside the scope of assigned job duties
Working odd hours without approval
Taking multiple short unexplained trips
Making unapproved contacts with competitors or business partners
Showing interest in projects or work outside the employee’s job areas
Remotely accessing the computer network from home or vacation outside approved work routines
Unnecessarily copying large volumes of materials or transferring information out of company systems
Simple Methods to Mitigate Insider Threats
Train employees on recognizing the indicators of an insider threat
Identify important information at your company and implement strong access controls and auditing for that information
Conduct background checks on personnel before hiring them. Consider conducting background checks on your employees every few years
Include a non-disclosure agreement and non-compete agreement in your work agreements
Have an organized employee termination process that involves IT and HR
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you
NIST SP 800-171 & CMMC Compliance
Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements.
HIPAA Compliance
Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
FAR 52.204-21 Compliance
Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
ISO 27001 Compliance
Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.