Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

How Human-Layered Security Can Reduce Email-Driven Data Breaches

By Tony Pepper
SEC0519-Review-Feat-slide1_900px
January 29, 2020

“Insider data breaches” are an increasingly hot topic in both business and cybersecurity circles. Despite the Hollywood-crafted image of the malicious, hoodie-wearing hacker sitting alone before a code-filled screen, the majority of real-life breaches are actually caused by insiders—everyday employees within the organization. In fact, a recent study conducted by my company revealed that more than 70 percent of organizations have suffered internal breaches within the past five years, and nearly half list accidental internal breaches among their top three security concerns.

Although the term “insider data breach” might conjure the image of a disgruntled employee with an axe to grind, not every insider threat is malicious. In fact, it’s fair to say that most insider-driven breaches come as the result of a simple mistake made by an employee during the normal course of his or her day. Maybe an email containing confidential information was sent to the wrong person. Perhaps a file was accidentally left unencrypted. Or maybe an employee simply fell victim to a well-crafted spear phishing or Business Email Compromise (BEC) attack. These mistakes are more common than you might think: as many as 44 percent of employees admit that they have accidentally exposed personal or business-sensitive information through their corporate email.

Cybersecurity professionals have long been forced to grapple with the fact that humans represent an unpredictable variable in their security calculations. After all, even the best static technologies like email gateways and AV filters can’t mitigate every risk, such a misdirected emails and attachments, or employees responding to spear phishing emails. But the advent of artificial intelligence and—more specifically—contextual machine learning technology have placed a valuable new tool in the hands of defenders. Cybersecurity solutions capable of learning about, adapting to, and eventually predicting human behavior have enabled security teams to add a new layer of protection: human layer security.

 

Understanding What Causes Accidental Breaches

When discussing breaches, it’s important to remember that, while a relatively small number of malicious actors are working against their employers’ best interests, most employees just want to do a good job. Scammers skilled in the art of social engineering understand this, which has given rise to many different spear phishing and BEC tactics. They will often use a compromised email address from a legitimate organization, sometimes even posing as someone in authority, and target individuals with financial or data security responsibilities. Despite the rise of file sharing and other potentially vulnerable services, our research has shown that both corporate and personal email accounts remain the primary cause of accidental data leaks.

Humans are creatures of habit. If your boss asking you to pay an invoice is an everyday occurrence, chances are you’re not going to call them on the phone to confirm every time—you’re just going to pay it. Particularly savvy scammers might not even need a compromised email address to make this scam work—a spoofed email, maybe one letter removed from the real address, can accomplish the same task if the target fails to double-check the “from” field. Catching the right employee on the right day can be lucrative for scammers. And the unfortunate fact is that scammers only need to succeed once to receive a payout. To prevent it, defenders need to be right every time—something that’s impossible to achieve with static technology and unpredictable employees.

There are several underlying problems that contribute to the lack of awareness behind these breaches, but incident underreporting and lack of training are chief among them. In general, employees do not want to draw negative attention to themselves. This is understandable, but it naturally leads to problems like the underreporting of suspicious behavior or failure to report a potential incident of compromise. It’s human nature. Who among us wants to admit that they sent confidential information to the wrong email address, or were lured in by a persuasive scammer? If there’s one thing that humans are very good at, it’s convincing ourselves that our negative actions do not have significant consequences.

Unfortunately, though, they frequently do. Even the most benign-seeming slip-up can have serious, real-world ramifications, but many employees remain startingly unaware of the fact that the wrong information in the wrong hands can lead to serious, company-wide breaches—and that those breaches can bring significant financial, operational and reputational harm. This is where education becomes a critical component of cybersecurity. It’s easy to write off a misdirected email as a silly mistake, but if you have been trained to recognize the potential fallout from such an incident, you might be more likely to report it to the security team, who can begin the process of mitigating the potential damage.

 

Addressing the Accidental Insider Problem

Even companies like Facebook and Google, presumed to be on the leading edge of technological awareness and skill, are not immune to accidental breaches. Just last year, a lone individual in Lithuania pled guilty to using BEC scams to steal over $123 million from the two tech giants. The man posed as a vendor, sending the companies false invoices that were all-too-often approved by well-meaning but unobservant employees. If even these companies, with their tech-savvy workforces, can’t stamp out accidental insider threats, it seems clear that education and training are not the only answers.

Fortunately, while understanding human behavior is a task best left to sociologists, today’s technology has made predicting it quite a bit easier. Tools equipped with contextual machine learning capabilities can be trained on corporate email accounts, monitoring emails and learning what constitutes normal and abnormal behavior. These tools can learn to identify who should be emailing what, and to whom, and to flag deviations from those norms to those individuals in real time, enabling them to fix their mistake before they even make it. Or prevent an email from leaving the organization altogether. An employee who might not self-report about a misdirected email can instead avoid the problem entirely when alerted to the mistake they are about to make. And what could be more valuable than a security system that can stop breaches before they happen?

Predictive analytics tools don’t just improve security for the sake of the organization. They also help employees feel safer and more comfortable by providing them with the opportunity to self-correct, rather than force them to decide between company security and their own reputation.

 

Fixing Mistakes Before They Happen is the Future

As Alexander Pope famously said: “To err is human.” Indeed, human error is something that cybersecurity professionals have been grappling with for decades. Until recently, organizations had little choice but to expect those common mistakes, building potential losses into their bottom line. And while the problem of human error is unlikely to ever be solved in its entirety, today’s human-layer security tools have offered security professionals a valuable new weapon to bring to the fight.

Pope’s words are generally followed by, “to forgive is divine.” And certainly, we need a culture of greater openness and understanding for unintentional incidents. But, when it comes to insider data breaches, more important than forgiveness is prevention. By using machine learning tools to help employees understand and identify when they may be engaging in risky behavior, businesses can educate employees about the consequences of their actions while preventing some of today’s most common—and costly—breaches.

KEYWORDS: cyber security cybersecurity data breaches email spoofing insider threats

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tony pepper
Tony Pepper is Chief Executive Officer at Egress.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Man and women on phone

    How security training can reduce human trafficking in hotels

    See More
  • cyber laptop2

    5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

    See More
  • ATM bank security

    How layered security can help prevent $150,000 losses from ATM attacks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!