What are Insider Threats and How to Counter Them


20 Dec 2015

What are Insider Threats and How to Counter Them

A large number of cyber security risks to businesses come from within.

Insider threats come in two variations. The first is the malicious threat where an employee, former employee, contractor or business associate deliberately bring harm to an organisation. A good example is someone with insider knowledge of the organisations security systems hacking or exploiting said systems. Normally, the perpetrators of malicious insider threats are disgruntled employees.

The other form of insider threat is accidental. An employee may in-avertedly open a malicious email that then spreads malware throughout the organisations computer systems.

People are arguably one of the weakest and easiest links to break in any organisations infrastructure. The social media information outburst, the blurred lines between corporate and home devices and often the lack of policy and procedures around the actions employees are allowed to take, all combine to create the opportunity for critical data cracks, which attackers are just one step away of utilising to penetrate a system.

Culture Metrics

CultureMetrics offers senior managers and executives the ability to monitor the internal culture of their organisation. It identifies management practices that risk fostering negative and counter-productive employee behaviour including sabotage, fraud, excessive risk-taking and disregard for corporate compliance. CultureMetrics provides early warning of dangerous management practices, to enable corrective measures to be taken before potential problems turn into actual financial and reputational loss. For more information on CultureMetrics and how it can help counter insider threats click here.

In essence, tackling insider cyber threats requires investment in education of staff at all levels.

Business leaders should sign themselves and their staff up to take PGI Cyber’s Cyber Security Awareness Course (CSA) which provides a comprehensive syllabus for protecting your own and your businesses online identity. For more information click here.  

For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

 

 

 

Share this article

Contact us

Call us now to discuss your requirements with one of our consultants.

Contact us today

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Watch Video

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Watch Video

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Watch Video
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP