Insider Risk

Insider Threats are a Risk to Your Data—Here’s How to Stop Them

By Veriato Team

From an article by Stephen Voorhees, CISSP and Senior Sales Engineer at Veriato, published on

Most companies have already hunkered down to prevent hackers from stealing proprietary data. Their security teams have almost certainly installed powerful firewalls. Some companies may have acquired robust security systems to protect themselves against ransomware, the malicious code that cyber criminals use to encrypt your data and hold it hostage until you pay a hefty ransom.

The trouble is, there’s a far greater threat to your company’s data from people inside your organization.

“In general, the greatest data security risk is posed to organizations by insiders,” Joseph Steinberg, an entrepreneur and cybersecurity authority, wrote in a Digital Guardian blog post. “If they want to steal it or leak it, they can usually do so with far greater ease than outsiders.” As Steinberg notes, insiders “have access to sensitive information on a regular basis, and may know how that information is protected.”

Some breaches and leaks by insiders are done with malicious intent—for personal gain or to satisfy a grudge. But research suggests that most of these insider incidents—87 percent, by one estimate—are caused by human error. This might include carelessly attaching the wrong file to a message or e-mail, misplacing a USB drive or a laptop, or sharing a file (via e-mail or social media) with the wrong people. Unfamiliarity with company security rules is at the root of threats to data in 82 percent of cases. And just as calamitous, if unintentional, is clicking on malware by mistake through phishing or some other attempts to penetrate a company’s system.

To read the full article, click here.

2023 Preparedness Checklist: Ensure Your Workforce Is Productive and Secure

This guide will help you understand where there are opportunities and risks in your workforce, and what you can do to make sure 2023 is as secure and productive as possible with workforce behavior analytics.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Productivity & Insider Risk Resources

A More Insightful, Proactive Approach to Employee Monitoring

A More Insightful, Proactive Approach to Employee Monitoring

Also known as “bossware” and even “employee surveillance”, employee monitoring has been placed in the bucket of technologies that companies force on their employees. Whatever you call it, its use is on the rise and it looks like it’s here to stay. As of 2022, 60% of...

Bossware and the Future of Work

Bossware and the Future of Work

Recently, there has been considerable coverage of “bossware” and a focus on draconian types of “surveillance” some companies are using to stay on top of remote and flexible workforces. Articles claim companies are accessing the camera on laptops and tracking every...

The Myths and Truths of Employee Monitoring

The Myths and Truths of Employee Monitoring

Early in the pandemic, searches related to “how to monitor employees working from home” increased by 1,705%. Without the oversight of managers in an office setting, many companies are concerned that their employees are less productive, and that there is an increase...