Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

3 ways to mitigate insider threats in a distributed workforce

By Devin Redmond
work from home

Image from Pixabay

September 23, 2022

When the world shifted to a distributed workforce more than two years ago, businesses were forced to quickly implement technology to replicate in-person communication and minimize productivity loss, often prioritizing it above security. As businesses consider what the workplace will look like moving forward, the growing risk of insider threats necessitate a robust security and compliance plan.

According to IBM, the cumulative cost of insider threats is nearly $11.5 million, with the majority of incidences stemming from negligence. Insider threats are now widely regarded as a common risk to business security, especially with a growing distributed workforce reliant on modern communication tools. While technology has become more sophisticated to accommodate work-from-anywhere environments, these new ways of sharing information have complicated legacy security and compliance procedures. In the absence of proper training and the implementation of security solutions, employees run the risk of becoming an insider threat.

Here are three ways to protect organizations from insider threats in today’s evolving workplace landscape.

1. Defining the threat vectors

The first step to tackle an insider threat is identifying possible sources. Some of the most obvious sources of insider threats are external attacks by malicious users or softer threats where employees are persuaded to overshare data or passively expose their systems. But as businesses continue to operate in a distributed workforce model, a new category is emerging where employees that are frequently using collaboration tools may be unwittingly sharing information with internal teams or external clients that fall outside of security and compliance standards set by their employer or broad regulatory bodies.

For example, when surveyed for Theta Lake’s Modern Communications Survey Report, 93% of respondents have files and/or links shared with them via chat at least a few times a week. More than half receive files and/or links a few times a day. Given the risks of receiving potentially malicious links in chat, it’s an area of huge risk for companies that do not have effective monitoring and reviews in place.

In the absence of traditional in-person meetings, people are connecting via collaboration tools where they may not be as mindful of security protocols due to the nature of these platforms. For example, a salesperson may be on an external call and mistakenly share the wrong screen with sensitive client information, or send a message with confidential data to the wrong person. Additionally, if a virtual meeting room does not have a password or waiting room, anonymous users might be able to sit in and monitor the call. Of course, intentional circumvention of organizational security rules about data sharing is a significant risk. When asked in the report, organizations indicated that employees circumventing email to share confidential information is the highest concern for most enterprises, with 63% of respondents indicating as such.

2. Understanding the risks of unified communications

While traditional monitoring tools are able to scan email and other written communication, video platforms do not have a built-in mechanism to monitor what is happening or what is being said, so virtual meetings present inherent risks. Programs that capture the text of the recording, such as a transcription service, are unreliable, and even still only cover a portion of what can be communicated during a meeting. Instant screen sharing capabilities or content uploads into the platform can expose desktops or documents containing risky or private content such as personal identifiable information (PII).

Furthermore, despite many companies disabling recording capabilities, attendees can still use non-native tools to capture the content. Thus, conversations thought to be proprietary can endure via recordings using standalone tools out of camera view or built-in app functionality. This lack of visibility into how video meeting content is used means that meetings can be shared to an unlimited audience beyond those who attended the live portion, leading to potential data leakage.

3. Identifying what’s at stake

Insider threats are more dangerous when businesses are not closely monitoring the various forms of communication taking place over collaboration tools, leaving more opportunities for employees to unintentionally share information via these channels. This can result in a number of consequences, such as:

  • Reputational loss from undesirable policy-breaking behaviors where an employee may say something inappropriate (racism, sexism, hate speech) in a meeting chat that then makes its way to the public realm.
  • User information leaks can expose sensitive information and lead to the termination of a user’s relationship with a business.
  • Loss of intellectual property from a breached boundary on a Zoom call or other platforms that may be unprotected, with valuable information or projects that can impact a company’s bottom line.

In order to ensure protection against insider threats, it’s essential to incorporate security awareness and proper policy monitoring into organizations’ technology and security strategies.

To better rectify these security issues, businesses must consider how best to implement data loss prevention, surveillance and security controls in the virtual, distributed workplace. This is not in conflict with enabling digital collaboration strategies, but rather to make these tools more trustworthy so organizations can reap the full benefits. With proper monitoring of changes in security and compliance protocols, as well as ensuring systems are updated to be compliant, businesses can remain productive and secure with distributed workforces. In fact, some collaboration tools already provide integrated features to leverage, such as Zoom’s built-in API that allows businesses to review hundreds of settings, determine which ones are riskiest and direct people to make updates.

Moving forward, as businesses assess their security and compliance solutions, they should consider how future investments in these areas should be complementary to their existing structure and not siloed as they often are today. Organizational structures will continue to transform and become more distributed, creating persistent concerns, but ongoing vigilance with evolving security and compliance frameworks is the first line of defense in protecting an organization.

KEYWORDS: communication security hybrid workforce insider risk insider threats personal identifiable information remote work

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Devin Redmond is the CEO and Co-Founder at Theta Lake. Redmond is a two-time founder and multi-time public company executive with 20+ years of experience delivering Security & Compliance technology. Redmond has helped some of the world’s leading software companies grow and innovate, including Check Point, Neoteris, Websense and Nexgate (Acq. by PFPT). Redmond is a prolific innovator, holding two patents, and is a frequent speaker and press contributor as seen on CNN, CBS, in Forbes, and at FinTech New York.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ddos-distributed-denial-service freepik

    How to protect against DDoS attacks in a distributed workforce model

    See More
  • Airport at Sunset

    Enlisting Airport Employees to Help Mitigate Insider Threats

    See More
  • employee works on computer

    4 ways to identify and prevent insider threats

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!