Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Categories
Articles

Reducing your vulnerability to insider threat

Monica Whitty’s keynote at the FIRST Conference (recording available on YouTube) used interviews at organisations that had been victims of insider attacks to try to understand these attackers – and possible defences – from a psychological perspective.

It turns out that thinking about stereotypical “insider threats” probably doesn’t help. Notably, disgruntled employees were responsible for a surprisingly small proportion of such incidents. Far more were identified by their colleagues as having a strong company loyalty. In demographic terms, attackers (at least those that were detected) show very similar patterns to typical workforces. Personality traits appear more promising, until you realise that the traits most likely be involved in insider incidents are also those in demand among successful organisations, particularly in ICT.

One thing that does seem to distinguish insider threats from other workers is motivation. By far the most common is addiction (including to something as innocent as bingo), followed by challenging circumstances in their personal life. And, strikingly, these were often known to the organisation before the incident took place. The trigger for them acting was often a sudden increase in anxiety. So it seems that a significant reduction in insider threat may be possible simply by providing better support for employees who seek help in dealing with personal problems. Organisational culture can also reduce the opportunity for insider threat – if someone is behaving strangely, it should be acceptable to ask if they are OK. Refusing to share passwords, let someone in to an area where they are not authorised, etc. should not be seen as lack of trust, but as helping them avoid a self-destructive path.

For more details, see the insider threat project’s home page.

My attention has been drawn to research by the Software Engineering Institute that highlights the importance of (perceived) organisational support in general, not just when employees are experiencing difficulties.

By Andrew Cormack

I'm Chief Regulatory Advisor at Jisc, responsible for keeping an eye out for places where our ideas, services and products might raise regulatory issues. My aim is to fix either the product or service, or the regulation, before there's a painful bump!

Leave a Reply

Your email address will not be published. Required fields are marked *