Insider Threats are Getting More Dangerous
Insider attacks are one of the most difficult attacks to detect. An “insider” is anyone that has legitimate access to your company network and data via login or other authorised connections. This includes employees and vendors.
Because insiders have authorised system access, they can bypass certain security defences that are designed to keep intruders out. They’ll know the passwords and have access to MFA codes, so defence systems won’t be alerted or triggered.
There are three troubling statistics from a recent report by Ponemon Institute that illustrate the importance of addressing this threat. Insider attacks are getting worse, taking longer to detect and becoming more extensive.
The report found that over the last two years:
- Insider attacks have increased by 44%
- It takes organizations 85 days to contain an insider threat, compared to 77 days in 2020
- The average cost of addressing insider threats has risen by 34%
4 Types of Insider Threats
One reason that insider threats can be hard to detect is that there’s not just one kind. Employees, vendors, and hackers can all perpetrate insider security breaches. To further complicate detection, some may be malicious and others accidental.
Here are the four main types of insider threats faced by company networks.
Malicious / Disgruntled Employee
A sales employee that is leaving the company may decide to take all their contacts with them – this is a malicious theft of company data. Another example of this type of insider attack is a disgruntled employee who may have had a disagreement with a manager or lost their job. They could then steal company data or do the business harm. For example, they could plant ransomware or make a deal with a hacker to give over their login credentials for cash.
Careless / Negligent Employee
Some insider threats are due to lazy or untrained employees. They don’t mean to cause a data breach but may accidentally share classified data on a non-secure platform. Or they may use a friend’s computer to access their business apps, being completely unaware of the security consequences.
3rd Party with Access to Your Systems
Outsiders with access to your network are also a very real concern. Contractors, freelancers, and vendors can all constitute an insider breach risk. You need to ensure that these third parties are fully reviewed before you give them system access. You should also allow your IT partner to review them for any data security concerns.
Hacker That Compromises a Password
Compromised login credentials have now become the #1 driver of data breaches around the world. When a cyber criminal can access an employee’s login, that criminal becomes an “insider.” Your computer system reads them as the legitimate user.