Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementPhysical SecurityCybersecurity News

Insider Threats: An Underestimated Risk

By Bud Broomhead
data theft
June 11, 2019

What is an insider threat? Security professionals know that insider threats, by their nature, are a broad-based threat and, more than ever before, can be extremely difficult to defend against. In this article, we will briefly discuss the possible risks, as well as some options for building up your defenses.

There are a range of possible motivations for insiders to hurt an organization, including greed, anger, and many more. Similarly, there are many possible methods by which an insider can damage or threaten an organization. Theft of property or information, or physical or electronic damage are all possible and different detection and defensive measures are indicated for each, tailored to the business that the organization is in. To be of most general use, we will focus mostly on cybersecurity issues, which apply to most organizations.

One area that is of particular importance today is the challenge of protecting confidential materials and data, and how important it is for innovative organizations to prevent the theft or alteration of intellectual property. Intellectual property can be stolen by an employee which can be sold to a competitor or foreign government, transmitted to a competitor in return for new employment, or even used to start their own company. A real-world example of this is the lawsuit between Cadence and Avanti, two semiconductor companies that had a six-year long court battle because of allegations that an insider stole confidential software code from Cadence, which was then used to found Avanti.

Working to prevent insider cyber threats involves careful monitoring of the company’s network, seeing what information has been downloaded and determining whether information has been downloaded to external sites. The trick is to strike the right balance of monitoring and privacy to sustain some level of employee confidentiality. Usually, a clear policy of network monitoring helps alleviate any concerns; without such a policy, employees can react badly if they discover they are “being spied on”. And, there may even be some applicable parts of the GDPR and other regulations that limit the employer’s ability to monitor employees. But at the same time, the business should control its risks and limit the damages it would suffer from the insider threats as much as possible.

One of the best ways to defend against insider threats is to ensure that critical data has a chain of custody. This can be accomplished using an automated verification solution that monitors the storage and retrieval processes for anomalies and triggers alerts when unexpected or unauthorized operations are attempted. Implementing this kind of system would apply to critical customer data, design and business information and even to stored video surveillance footage.

For example, insiders that are planning thefts, vandalism, or other unwanted behaviors would be aware of video surveillance cameras and could also know where the video surveillance data is stored. Doing some malicious file deletions, including the footage that would otherwise incriminate them, would be a good way to help cover their tracks. Most organizations would not be aware that something like this was happening, unless they were using an automated verification solution. Automated verification solutions are really needed to make sure the chain of custody is maintained, and the evidence is valid. By virtue of having an automated verification system that is analyzing, checking and watching for anomalies, an organization will be on top of potential threats to the security environment. If that system has the capability, it can also monitor who is on the network, who has authorization for what operations and who did what and when. From the forensic angle, it's a powerful ability to do ongoing, automated continuous anomaly detection.

One more powerful tool for battling insider threats is to decrease the chances of account misuse – that is, someone ‘borrowing’ the login information of a person with higher network authorities. This can be straightforwardly minimized by implementing two-factor authentication, particularly when one of the authentication methods is based on biometrics.

Whether their objective is tied to greed, sabotage or espionage, insiders can cause enormous damage to all types of organizations. With sensible protective measures in place, much of the potential for cyber damage can be reduced. Don’t wait until an incident occurs – encourage your IT and security management to cooperate and take proactive steps.

KEYWORDS: cybersecurity data theft insider threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bud Broomhead is CEO of Viakoo

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • bored-enews

    Enterprises at Risk from Accidental Insider Threats

    See More
  • cybersecurity

    How to Minimize the Risk of Insider Threats (Physical and Cyber) During COVID-19

    See More
  • Security newswire default

    New Report Reveals How Accidental Insider Threats Put Organizations at Real Risk

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing