Guide for Protecting your Company against Insider Threats

Guide for Protecting your Company against Insider Threats

Cybersecurity is mainly outward facing.  Most products like firewalls, anti-spam, and network intrusion devices are designed to keep hackers on the outside from getting in, but that outward approach does not address an equally dangerous situation: the insider threat.

A Profile of the Insider

There are two kinds of insider threats:  the malicious employee, contractor, or vendor and the unwitting victim of a hacker attack.  IBM in its 2016 Cyber Security Intelligence Index says that 60% of cyberattacks came from insiders.  Three-quarters of those were intentional.  Case in point - monitoring what goes on inside your network is just as important.

The employees to watch for are:

  • Disgruntled employees
  • Employees  with access to sensitive information that can be monetized
  • Phishing Victims
  • Employees who are just careless with regards to security

Below we show specific events that an employer should monitor in order to detect and prevent insider threats. Remember, every organization is different, so work backwards to understand what files and systems you want to protect and then check who has access. Many times, we’ve seen companies realize that an audit was never performed on user access and many more people than they thought had access to sensitive information.

Monitoring Employee Behavior - Behavior to Look Out For

Deleting Files. Employees delete files for many reasons, however, those files are company property and most likely could have been used at a future time. Additionally, deleting files in a system can cause structural IT damage. Alerts should be set for deleted files, based on seniority, access and file type.

Delete or Access Key Accounts. Not everyone needs access to everything. Sometimes in order to not inhibit particular work processes, employees are given access to files that are stored with other information not necessary for their tasks. When employees access files that do not pertain to their daily tasks and roles, the access should be recorded and depending on the sensitivity of the file, administrators may need to be alerted.

Copying data to a USB. It’s the easiest way to walk away with a chunk of data. All USB inserts and information copied to USB drives should be monitored.

Sending email to a competitor. We all know who’s hands we wouldn’t want our data to land in. Create a list of competitors and domains you would find suspicious if data was sent to from a work computer.

Printing confidential information. This can be dangerous for two reasons - one it’s easy for an employee to transfer data to a third party but it can also leave a client’s information just lying around the office for anyone to see.

Granting access. Some industry regulations, such as SOX and HIPAA, require that employers have a certification process. This is a formal, documented process for approving and granting employees access.  But certain individuals have access to grant themselves elevated access.  Or a person can get a hold of the credentials of an administrator.

Keyboard logging. Keyboard logging while popularly used by malicious users from the outside can also be a valuable tool for real-time alerting (for example if someone reached how to access blocked files) and even more helpful when doing IT forensic investigations to understand the full story.

Applications Used. Applications used should be monitored for two reasons. The first reason is because insider threats are more likely to use personal applications to transfer data. So if you see someone is logging into their g-mail account at work more than usual - that’s a red flag. Another reason is to compare one user’s application use to others within the department. If someone is consistently logging into applications that no one else in the department is using - that can be a red flag as well.

What  actions should be taken if users engage in high-risk behavior?
Each type of behavior needs to be given an appropriate risk level. For example, a very- high risk action could be putting company financials onto a USB drive while a low risk action could be copying an unreleased brochure to a USB drive. In many cases, if the action is low risk, its best to warn the user and notify them that their behavior could be of risk to the company. This has been proven as a good preventive measure from having the user repeat the action. If the behavior is deemed as high risk, blocking the action or locking the employee’s account is acceptable protocol.

After-the-Fact Forensics

While taking all the above preventive measures should keep your organization secure - employees can get creative. Logging employee actions is key to the after the fact investigation. Not only does it help you figure out what en employee has taken or deleted, but also the weak point in your security setup. Having this information allows you to protect yourself in the future. Additionally, the data can also be helpful in case of any legal action.

On the Need to be Secure

Looking out for and being able to track the aforementioned behavior allows employers and administrators to add an extra degree of security to their IT infrastructure. The amount of incidents surrounding insider threats is on the rise every year and still the majority of organizations haven’t put in the proper procedures to detect and prevent insider threats. Don’t let your organization get the bad rep from a data breach or have their IP stolen - start putting the proper measures in place today.


Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.