Insider Risk

The Widespread Risk of Insider Threats

By Veriato Team

There is a great infographic put out by the good folks at Deloitte on the topic of insider threats.  They’ve done a wonderful job packing a great deal of information into an easy to understand presentation.

I was struck by the stats at the top of the infographic:

A lot to unpack here.  The overwhelming majority of cases studied were, in hindsight, not a surprise.  The behavioral warning signs were there.

  • 92% of insider threat cases were preceded by a negative work place event, such as a termination, demotion, or dispute with a supervisor.

I’ve written and talked about the need for Infosec to partner with HR to make sure that the organization is taking appropriate steps to defend itself.  This can be done without violating employee privacy, and it needs to start happening.  HR has insight that security needs.  Fail to collaborate at your own risk.

  • 59% of employees who leave an organization voluntarily or involuntarily say that take sensitive data with them.
  • 90% of IT employees indicate that if they lost their jobs, they’d take sensitive company data with them.

We’ve surveyed on this same topic on the past, as have others.  A couple of years ago, the overall number was lower – right at 50%.  While it could be the survey methodology, I am intrigued that we may actually be seeing an increase in IP walking out the door at the end of the employee lifecycle.  I’m shocked by the higher number for IT.  This issue is relevant to every organization, regardless of vertical or size.  I’m speaking on this topic – and how you can address the problem – at Secure360 Twin Cities on May 18.  Get there if you can.  I hear it’s lovely this time of year.

The bad news is that we have problems.  The call is coming from inside the house.  The good news is there are ways to address the problems.  We’ll delve into those in our next post.

Insider Risk – How Prepared Are You?

Insider Risk – How Prepared Are You?

Not every company is equally prepared to deal with insider risk. This report outlines the four stages of insider risk maturity and explores how to improve your insider risk preparedness.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Insider Risk & Employee Monitoring Resources

Smart Year-End IT Investments- A Trifecta for ROI

Smart Year-End IT Investments- A Trifecta for ROI

Drive Productivity, Reduce Insider Risk, Enforce Compliance As the year wraps up, many IT, security, compliance, and HR teams have unspent budgets that won't roll over. Rather than scrambling for last-minute, low-value purchases, why not make smart, strategic...

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Is IAM, SIEM, and DLP Enough to Combat Insider Risk?

Key Takeaways: Closing the Gaps in Traditional Security Tools: IAM, SIEM, and DLP are vital but insufficient in addressing insider risks. They focus on access control, event logs, and data protection without understanding the behavioral context that signals insider...