Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

How insiders open organizations up to cyberattacks

By Colonel Michael Hudson
employee
May 24, 2022

Earlier this year, President Biden delivered a stern and urgent warning to the business community in response to evolving intelligence that Russia could be planning cyberattacks against critical U.S. infrastructure: “If you have not already done so… harden your cyber defenses immediately.” FBI Director Christopher Wray also echoed this warning and added that both China and Russia have been aggressively seeking to find and exploit vulnerabilities to gain access to American companies.

A rise in cyber incidents

Cybercrime against private-sector targets has already been exploding. The recent 2021 FBI Internet Crime Report discussed “an unprecedented increase in cyberattacks and malicious cyber activity,” with close to 850,000 internet crime complaints reported last year — an 81% jump from 2019. Ransomware attacks alone increased almost 93% in 2021, with more than half of those incidents occurring in North America.

Looking at some of the recent high-profile ransomware incidents over the past year perpetrated by Russia affiliated hacker groups, like the attack on the Colonial Pipeline and the world’s largest meat processor JBS, security leaders may be seeing a harbinger of what’s to come. The ongoing war in Ukraine will only increase this risk, especially as sanctions continue to increase on Russia.

Companies continue to spend a lot of time, money and resources securing their enterprise systems over the years, doing everything from strengthening firewalls and endpoints to enhancing user activity monitoring and installing multi-step data encryption and password protection. So why, after all these investments in security, are companies still at great risk of cyberattacks?

Insider threats to an organization

One often and easily overlooked vulnerability is people — those inside the organization who may be willing to use their access for personal gain or who are vulnerable to external coercion to circumvent company protections. In all cases, the negative impact to the organization can be significant, but it can also be avoided.

Employees are an easy entry point target for hackers. According to 2021 cyber statistics, 92% of malware was delivered by email and 90% of data breaches were the result of phishing. The risk of a data breach is compounded by workers who, despite their training, are distracted by emergent negative life events or other external stressors and still click the link.

Beyond the risks of spear phishing, hackers are taking an increasingly direct approach to get employees to upload ransomware. Hackers have approached 65% of executives or their employees to assist in ransomware attacks. Malicious actors identify those who are struggling financially or may otherwise be receptive to a large amount of cash. It has been said that anything is for sale for the right price, and that includes an organization’s most trusted employees. Bribes can turn trusted employees into malicious insiders who secretly help launch a ransomware attack against an organization. This insider threat is every bit as dangerous as an external cyberattack.

Protecting against internal cyber threats

Hardening company defenses starts with cybersecurity training on how to avoid making potentially compromising mistakes both in and out of the physical workplace. Training should include being able to identify a phishing scam and learning what to do in the event of a compromise. This training must be reinforced with proactive employee outreach to support those who are struggling and are at a high risk of being distracted.

In tandem with training and monitoring, there must be the ability for employees to anonymously report suspicious activity or encounters in the workplace, especially if they are asked to participate. Available platforms that include an anonymous self- and peer-reporting feature also create a critical paper trail. In instances where there are multiple reports of suspicious behavior from an employee, contractor, or even client — especially if that behavior persists after intervention — leadership can use that evidence as grounds for whatever action must come next.

The government is getting on board with a reporting approach: President Biden just signed a law requiring companies to alert the Cybersecurity and Infrastructure Security Agency within 72 hours of a cyberattack and report ransom payments in 24 hours. These kinds of policies can give security leaders greater insight into the nature of the threats before them.

Finally, having a continuous behavioral monitoring system in place can help identify anomalous employee digital behavior, whether it be web browsing, emails or social media posts. This allows management to address a potential risk before it causes irreparable financial and/or reputational harm to the organization. Organizations must also expand their risk surface to include the employees who are struggling financially.

There is an oft-used phrase that a company’s greatest asset is its people. To stay true to that maxim, organizations need to do more to incorporate that asset into their overall risk management strategy. As cybercriminals become more sophisticated and brazen, the old way of just fortifying networks is no longer enough.

KEYWORDS: cyber security threat employee security incident reporting insider risk phishing attack ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Col. Michael Hudson, a 30-year Marine Corps veteran, is the Vice President of Government Solutions at ClearForce, LLC, an organization that protects organizations, users and employees through the continuous and automated discovery of employee crime, misconduct and high-risk behavior.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people talking to pharmacist at counter

    How pharma organizations can combat third party cyberattacks

    See More
  • vaccine covid

    2021 could bring more vaccine-related cyberattacks, here’s how distribution organizations should prep

    See More
  • small business owner

    How COVID-19 has made small businesses more vulnerable to cyberattacks

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing