What is Insider Threats.
Types of Insider Threats:
In order to protect users’ organization from insider threats, it’s important to understand what insider threats look like.
A) Negligent: Negligent insiders may not intend to put the organization at risk, but do so non-maliciously by behaving in insecure ways. Clue-less and Care-less insiders both belong to this category. These insiders may be non-responsive to security awareness and training exercises or may make isolated errors by exercising bad judgment. In either case, negligence is often cited as the most expensive type of employee risk. Careless employees or vendors can become targets for attackers. Leaving a computer or terminal unlocked for a few minutes can be enough for one to gain access.
B) Collusive: Collusiveinsiders will collaborate with malicious external cyber-criminal to compromise the organization security. While it is risky and rare, this type of insider threat is becoming more common as professional Cyber criminals are increasingly using the dark web to recruit employees as allies. These cases often involve fraud, intellectual property theft or a combination of the two, which can make them very costly. This type of collusion may also take longer to detect as malicious external threat actors are typically well-versed in security technology and strategies for avoiding detection.
C) Malicious: Maliciousinsiders steal data or commit other negative acts against the organization with the goal of financial rewards or other personal gains. Malicious insiders looking for a second stream of income will typically steal data slowly to personal accounts to avoid detection. Another type of malicious insider, the disgruntled employee, will aim to deliberately sabotage a company or steal its intellectual property. They may be seen combing through sensitive company information or completing large data exports, especially around the time they resign from their position or give the customary a time bound notice before leaving a position.
D) Third-party: These insiders are contractors or vendors that a business has typically given some kind of access to its network. These insiders may have employees that fall under one of the categories above or may simply have flaws in their own systems and devices that open vulnerabilities to attackers.