Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity Education & Training

Surveillance won’t curb insider threats — but workplace culture can

By Jadee Hanson
employee computer

Image from Unsplash

December 7, 2022

Five million dollars. That’s how much an insider risk event could have cost one company when proprietary source code was exfiltrated by a software engineer who recently resigned. In this case, the file movement was detected and never left the company, but without the proper security measures, this scenario could have been much worse.

The uptick in employees taking sensitive data, presentations and customer lists with them when they quit is one of the many residual effects of the Great Resignation and shift to hybrid-remote work. The Great Resignation served as a catalyst for departing employees to unknowingly expose, leak or exfiltrate intellectual property (IP), something many organizations weren’t prepared for. At the same time, hybrid work changed the way we collaborate and communicate, creating new opportunities for data exposure. Employees are using personal clouds, emails and unsanctioned apps more frequently to get work done and some organizations have found themselves in the dark when it comes to the movement of their data.

Employee surveillance software has become a prevalent response to these new conditions, with demand for the technology 54% higher than before the pandemic began. Companies gravitate towards these invasive tools because they believe they give them visibility into their data. Not only do they monitor employee keystrokes, but also website visitations, file downloads and email attachments. These kinds of tools are not an effective way to minimize insider risk. Rather, they perpetuate a larger culture of distrust between a company and its employees — one that only contributes further to the problem.

Employees whose companies are using these technologies cite feeling like their company is violating their privacy, resulting in disengagement, “quiet quitting,” and an overall decrease in employee morale with a high increase in turnover. While the solutions may have been implemented to monitor performance or to track assets, surveillance tech lacks transparency and compromises the trust and collaboration necessary to build a culture of security.

When it comes to managing and preventing data exposure by employees, surveillance tech is not the solution. Instead, companies need to build a security-aware culture that establishes data ownership policies and empowers employees to do their part to protect the company. Creating this culture leads to every employee taking responsibility for security and encourages them to speak up. With an established level of trust, employees will reach out to security teams when they see something that might not be secure, and they are more likely to ask security for help when they feel as though they are taking a risky action that may violate a security policy. To do this, security teams and leaders need to create a culture that is built on trust and empathy, empowering employees while also keeping data safe and teams on track:

1. Establish an acceptable use policy

To avoid employees unknowingly exposing data, they first need to understand acceptable — or unacceptable — uses of data and how their employer is watching data move. Define what data belongs to the business and what belongs to employees. Today, employees feel a much greater sense of ownership of their work, feeling it belongs to them as opposed to their company, which is why we see so many employees taking data with them when they leave. Make sure to communicate this ownership during onboarding and again during offboarding.

2. Build a culture of empathy and trust

When employees move data to personal clouds or use their personal email, it is often unintentional. In fact, more than 75% of insider data breaches have been considered non-malicious. The goal of an insider risk program should not be to “catch” employees, but to better educate and guide them. When data is exposed, approach the investigation assuming the user’s intent was positive and provide awareness education in the moment so the impact is longer lasting.

3. Educate consistently

Security teams need to make employees part of the solution, training them on the proper ways to share and handle data from the start. Training needs to be consistent and ongoing. Look to incorporate insider risk training throughout an employee’s daily workflow. For instance, if an employee tries to send themselves a personal email containing company IP, a short video reminder that pops up on their screen to explain that what they are doing is a security risk can be effective in creating lasting positive habits.

4. Establish what is risky vs. noise

Only a small amount of data movement will actually pose a serious risk to companies. Employees, on the other hand, create thousands of data events in a day. Security teams should have ways to see all data movement so they can better define what “bad” data movement actually looks like to cut through the noise and identify indicators of true risk.

5. Update data protection tech

Outdated data loss prevention tools can no longer keep up today’s modern, cloud-reliant workforce. Organizations need technology that can see movement across cloud apps, will automate security alerts and prioritize insider risk concerns. Look for data protection technology that can tell the difference between trusted and untrusted locations and cloud domains.

Security culture relies on the entire organization

A good security culture starts with a security team that is willing to enable the organization to get their job done. Security teams need to build programs in a way that doesn't erode trust. The solution won’t lie in intrusive monitoring of employees' every action in order to protect company data. When it comes to managing and minimizing insider risk, there is no place for surveillance technologies. It’s not an effective solution and compromises the culture of trust that is necessary to build out successful security practices.

By establishing a data protection program based in trust and transparency, security teams promote collaboration and innovation among all levels of the business, while still having the visibility needed to monitor for risks.

KEYWORDS: employee monitoring employee morale hybrid workforce insider risk insider threats intellectual property protection workplace culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jadee Hanson is CISO and CIO at Code42.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security burnout

    Burnout can lead to security threats, insider risk

    See More
  • threat

    How security teams can combat social engineering and insider threats

    See More
  • Scientific Advances Can Help But also Include Potential New Bioterror Threats

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing