Technology becomes outdated in the blink of an eye. Similarly, a new security system deployed today to secure infrastructure or data is almost inherently going to be less secure tomorrow. In an era of fast communication, there are lots of people eager to break new technology — to find vulnerabilities and weaknesses in systems, ethically or unethically.

However, it’s not always malicious actors outside the organization who are at fault. Insider threats are a real danger as well and should not be overlooked.

Implement Prevention Training for Insider Threats

While deploying the latest secure system to fight against cyberthreats is a good strategy in itself, your organization must also implement an effective management system to educate employees and proactively detect warning signs to minimize insider threats.

Implementing an annual cybersecurity or data privacy training curriculum that is well-designed and engaging is an essential step in this effort. This curriculum should not simply consist of reading lots of text, listening to some audio clips and clicking through a presentation. Instead, it should be interactive and include relevant examples. If employees don’t dread security training, they’ll be more likely to absorb the information and put it into practice.

Training about how to identify the difference between malicious emails and legitimate ones is a vital part of this employee education. When you get an unwanted email, it’s tempting to fire off a quick “unsubscribe me” response. But spammers love it when recipients do this because it confirms that the email address is valid. Employees must be competent in their ability to identify spam — and know that it’s always best to flag it for the organization.

Get Smart to Shut Down Insider Threats

Prioritize Effective Risk Communication

Often, when a new vulnerability emerges, an organization will communicate that to its employees. But these communications may be too technical for all employees to understand. When these messages are overly complicated or more detailed than they need to be, employees may lose interest in reading them — and may fail to comprehend the vulnerability’s impact. Well-written messaging is essential when it comes to communicating to employees about vulnerabilities. The clearer the communication is, the more likely it will be that employees can avoid missteps that might lead to a breach.

Data-privacy risks related to potential vulnerabilities are not just for employees taking care of infrastructure, systems or servers. Breaches that exploit these vulnerabilities can impact any level of an organization. Any employee can be affected, and a mere click on a suspicious link from anyone in the organization can lead to disaster. Because of this, clear communication needs to be a priority — not an afterthought.

Minimize Risk by Categorization

Categorization of employees is another way to minimize risk. You can do this by sorting your workforce into two categories: privileged and standard.

Privileged employees are those who have access to sensitive information and client data. These users pose the biggest insider threat and should be provided with more secure systems. The rest of your employees, who should be classified as “standard,” require less restriction.

Develop Social Media Guidelines

Implementing social media guidelines should be another priority. Though many organizations block popular social media platforms, they might not perform risk assessments for company-sanctioned social platforms or internal collaboration tools. On social media, people are likely to click on links they would avoid in an email.

Consider, for example, the malicious and fraudulent news articles spread on social media platforms. An employee might not be aware of such a post’s real purpose, but just because a friend or colleague shared it, he or she might click on the link. Even worse, the user might simply click “share,” spreading the fraudulent link to others. That lack of skepticism contributes to the rapid spread of unverified news and malware.

Watch Out for Red Flags

Most breaches caused by insiders are unintentional, but that doesn’t mean that intentional internal breaches are outside the realm of possibility. There might be a situation where an employee goes rogue and steals secrets, but warning signs are often evident before such an internal breach.

An employee suddenly starting to work extra time on-premises or logging in at odd hours or on weekends can indicate something sinister. Inside the office, an employee frequently roaming around areas that have nothing to do with his or her work or copying sensitive business information can also raise red flags.

Security teams need to address these indicators proactively to avoid insider threats, especially given the rising cost of an insider breach. By being vigilant in minimizing internal risks — both of the intentional and unintentional varieties — organizations can potentially save millions in remediation costs.

Listen to the podcast: How to Hack a Human

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

X-Force certified containment: Responding to AD CS attacks

6 min read - This post was made possible through the contributions of Joseph Spero and Thanassis Diogos. In June 2023, IBM Security X-Force responded to an incident where a client had received alerts from their security tooling regarding potential malicious activity originating from a system within their network targeting a domain controller. X-Force analysis revealed that an attacker gained access to the client network through a VPN connection using a third-party IT management account. The IT management account had multi-factor authentication (MFA) disabled…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today