Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Are your employees contributing to external threats?
Global Security

Are your employees contributing to external threats?

AdminBy AdminJuly 17, 2024No Comments5 Mins Read
External Threats
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 17, 2024Hacker newsInsider Threats / Cyber ​​Security

External threats

Attacks on your network are often carefully planned operations initiated by sophisticated threats. Sometimes your technical fortifications present a huge problem and the attack needs help from within to succeed. For example, in 2022, the FBI issued a warning1 that SIM swapping attacks are on the rise: Get control of your phone and get a gateway to your email, bank accounts, stocks, bitcoins, credentials and passwords. Last spring, current and former T-Mobile and Verizon employees reported receiving unsolicited text messages asking if they would be interested in more money2 in exchange for the intentional inclusion of “Lifting the SIM card”.

These malicious insider headline stories are certainly real, but many external attacks come from a much less visible source: casual insider. These are career employees, contractors, partners, or even temporary seasonal workers who, through negligence or ignorance, allow internal weaknesses to be exploited.

Accidental insiders inadvertently breach security by:

  • Lack of Awareness: Employees unfamiliar with advanced cybersecurity practices can fall victim to phishing campaigns, open malware-infected attachments, or click links to malicious sites. Awareness is related to company culture and reflects the effectiveness of non-technical controls, especially management.
  • Pressure to perform: Your employees learn how and when to “break” the rules or bypass technical controls to get the job done or meet a tight deadline.
  • Poor credential handling: Weak passwords, password sharing, and password reuse across personal and business accounts make it easy for attackers to gain unauthorized access.
  • Sneakernets: The unauthorized and uncontrolled movement of data across security domains and onto personal removable media or public cloud services.

By unwittingly violating security best practices, casual insiders pave the way for external attacks in several ways:

  • Initial attack: Phishing emails can trick unwitting insiders into revealing network or application credentials, allowing attackers to gain access to internal systems. This initial attack vector becomes the basis for subsequent attacks.
  • Elevated Privileges: Accidental insider downloads of malware can give attackers elevated privileges, allowing them to tamper with critical systems or steal large amounts of data.
  • Lateral Traversal: Once inside, attackers will use insider access privileges to laterally traverse the network, access sensitive data and programs, or deploy malware on other systems.
  • Social Engineering: Social engineering tactics exploit human trust. Attackers can impersonate managers and colleagues to get insiders to reveal sensitive information or use their privileges to benefit an external threat.

The consequences of an accidental insider attack can be significant:

  • Financial Losses: Data loss resulting from insider carelessness and ambivalence results in large fines, legal ramifications, and remediation costs.
  • Reputational Damage: Public disclosure of an insider event can seriously damage an organization’s reputation, resulting in lost business and undermining customer confidence.
  • Business disruption: Attacks can disrupt business operations, resulting in downtime, loss of productivity and disruption to revenue.
  • Theft of intellectual property: Foreign countries and competitors can use stolen intellectual property to gain an unfair advantage in the marketplace.

The good news is that the risk from accidental insiders can be significantly reduced with proactive measures:

  • Security Awareness Training: Regularly train employees on cybersecurity best practices, including phishing awareness, password protection, and secure data handling practices.
  • Safety Culture: Develop a safety culture within the organization where employees feel comfortable reporting suspicious activity and where managers are educated and empowered to use internal resources to address safety issues.
  • User Activity Monitoring (UAM): Monitor compliance with acceptable use policies and increase surveillance of privileged users with increased access and the ability to manipulate security controls. Add behavioral analytics to examine UAM and other enterprise data to help analysts identify the most at-risk users and organizational issues, such as hostile work environments, identified through sentiment analysis. A hostile work environment reduces employee engagement and increases dissatisfaction, which is a dangerous recipe for insider risk.
  • Content disarmament and reconstruction (CDR): Proactive protection against known and unknown threats contained in files and documents by extracting legitimate business content and removing untrusted content, including malware and untrusted executable content.
  • Cross-domain solutions: Eliminate sneaker networks and unauthorized use of cloud services and replace these practices with automated, deep, policy-based content validation in an unencumbered user experience. Enable your employees to move data safely, securely and quickly between security domains that support business processes while protecting data and information systems.
  • Institutionalize accepted best practices: Carnegie Mellon SEI CERT, MITRE, NITTF, and CISA are examples of some of the organizations that have published best practices that include organizational controls over leadership, human resources, and other elements that affect the employee lifecycle and aligned technical means of control. which act as fences that protect against random and malicious people.

Casual insiders pose a significant threat that can leave organizations vulnerable to external attacks. However, by implementing appropriate training, technical and organizational controls, and developing a safety culture, organizations can do much reduce risk.

Protect yourself from the risks posed by trusted insiders with help Everfox Insider Risk Solutions.

note: This article was written by Dan Velez, Senior Manager of Insider Risk Services at Everfox, who has over 16 years of insider risk and threat experience at Raytheon, Amazon, Forcepoint, and Everfox.

  1. https://www.ic3.gov/Media/Y2022/PSA220208

  2. https://www.bloomberg.com/news/newsletters/2024-04-19/t-mobile-verizon-find-cracking-down-on-sim-card-scams-is-hard-to-do

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.