malvertising

Signs an Employee Might Be an Insider Threat

More than 34% of businesses around the globe are affected by insider threats yearly.[1]

Join our newsletter:

Who is An Insider?

Insider Threat Example
“An insider is any person with authorized access to an organization’s resources to include personnel, facilities, information, equipment, networks, or systems.[2]”

What is an Insider Threat?

The insider threat is the risk an insider will use their authorized access, wittingly or unwittingly, to do harm to their organization. This can include theft of proprietary information and technology; damage to company facilities, systems or equipment; actual or threatened harm to employees; or other actions that would prevent the company from carrying out its normal business practices.”[2]

Insider Threat Warning Signs

gambling
  • Anger/revenge - wanting to retaliate against the company for reasons including a perceived lack of recognition, missed promotions, issues with management or co-workers, or a pending layoff
  • Compulsive or destructive behaviors - drug, gambling or alcohol dependencies
  • Family problems and other personal sterrosors
  • Removing proprietary information or seeking access to material outside the scope of assigned job duties
  • Working odd hours without approval
  • Taking multiple short unexplained trips
  • Making unapproved contacts with competitors or business partners
  • Showing interest in projects or work outside the employee’s job areas
  • Remotely accessing the computer network from home or vacation outside approved work routines
  • Unnecessarily copying large volumes of materials or transferring information out of company systems

Simple Methods to Mitigate Insider Threats

  • Train employees on recognizing the indicators of an insider threat
  • Identify important information at your company and implement strong access controls and auditing for that information
  • Conduct background checks on personnel before hiring them. Consider conducting background checks on your employees every few years
  • Include a non-disclosure agreement and non-compete agreement in your work agreements
  • Have an organized employee termination process that involves IT and HR

References

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 NIST SP 800-171 & CMMC Compliance App

NIST SP 800-171 & CMMC Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.