{"id":4464,"date":"2022-06-20T03:19:04","date_gmt":"2022-06-20T10:19:04","guid":{"rendered":"https:\/\/cardonet.com\/news\/?p=4464"},"modified":"2022-06-20T03:19:07","modified_gmt":"2022-06-20T10:19:07","slug":"insider-threats","status":"publish","type":"post","link":"https:\/\/cardonet.com\/news\/insider-threats\/","title":{"rendered":"Insider Threats"},"content":{"rendered":"\n<p><strong>Cybersecurity infrastructure is vital for your business continuity. We have talked in previous blog articles about some of the best ways to keep your business safe from outside attacks. It is, however, important to remember that not all threats or attacks come from the outside.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What are Insider Threats<\/h3>\n\n\n\n<p>Insider threats come from within the organisation. This can include current and former employees, contractors or partners. The cost of an insider breach can be almost double that of an outsider, so it is really important to understand how to prevent them. Insiders can cause a lot more damage than outside cyber criminals as they have direct access to sensitive company information and data.<\/p>\n\n\n\n<p>The following scenario is typical of insider breaches. Often, an employee will be contacted by a cybercriminal and offered significant amounts of money in exchange for information such as passwords. Sometimes an employee will agree to this because they are unhappy with their employment, other times they are simply lured by the prospect of money. Whatever the motivation, insider breaches are very serious and can have devastating consequences, both for the individual and the company.<\/p>\n\n\n\n<p>Insider breaches can be:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Intentional \u2013 a malicious insider will aim to bring harm to the company for personal gain. This is often because of a personal grievance, such as being refused promotion or pay rise and management issues.<\/li><li>Unintentional \u2013 this includes both negligent and accidental breaches. An example of negligence would be not following a password policy or failing to install security patches. Accidental breaches could include accidentally sending a confidential email to the wrong person or opening a phishing email. Accidents can be minimised with a proper cybersecurity training programme, but human error is always a risk.<\/li><li>Collusive \u2013 this is where multiple insiders work together to collaborate with an external threat. This could be throughout different departments as they will have access to different areas of the business.<\/li><li>Third-party \u2013 parties who are not directly connected to the company but still have some sort of access, such as contractors or vendors.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">How to Avoid Insider Threats<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Whilst you should not create an atmosphere of distrust in your company, it is important to be vigilant for threats. Think about whether any employees have a reason to feel animosity or have any resentment towards the company.<\/li><li>Provide regular <a href=\"https:\/\/cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/\">security awareness training<\/a> for all staff. Keeping your employees educated and informed about cybersecurity is the best way to help them avoid making errors. SAT is about teaching employees to change their behaviour, create best practices and increase awareness of cybersecurity. It empowers your employees with the knowledge and ability to use technology safely.<\/li><li>Manage and limit privileges. Your business should have a strong acceptable use policy. You can set up permissions that limit what websites employees can access from company issued devices. You can also detail what can and cannot be accessed from personal devices. Limiting administrative capabilities is also a good idea; not every employee needs to have access to all the information and data your business stores. The fewer people who have access to sensitive information, the smaller the risk of a data breach.<\/li><li><a href=\"https:\/\/www.cardonet.com\/network-penetration-testing-business.php\">Penetration testing<\/a>. By conducting a network penetration test, we will simulate a real-world cyber-attack on your business. We will try and unlock vulnerabilities in your networks, applications, devices and people with a view to learning where your systems and training needs to improve.<\/li><li>Implement <a href=\"https:\/\/www.cardonet.com\/managed-24-7-network-monitoring-business.php\">24\/7 network and endpoint monitoring<\/a> to detect anomalous behaviour. Our 24x7x365 network monitoring service will constantly scan your IT Infrastructure and will alert us to any issues and allow us to respond before they become business affecting, helping keep your systems running and your business stakeholders happy.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>If you\u2019re looking for a trusted IT partner to help you and your team build strong defences against cybercriminals, reach out to us today on&nbsp;<a href=\"http:\/\/+44%20203%20034%20224\/\" target=\"_blank\" rel=\"noreferrer noopener\">+44 203 034 2244<\/a>&nbsp;or&nbsp;<a href=\"http:\/\/+1%20323%20984%208908\/\" target=\"_blank\" rel=\"noreferrer noopener\">+1 323 984 8908<\/a><\/strong>.&nbsp;<strong>Alternately, you can<\/strong>&nbsp;<strong><a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\" target=\"_blank\" rel=\"noreferrer noopener\">contact us online<\/a>.&nbsp;We will be happy to help you overcome your IT challenges.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Our friendly team will help guide you through your options and will help ensure that you get the right IT Outsourcing contract for your organisational needs.<\/strong>&nbsp;<strong>We have engineering bases in the United Kingdom, Europe and Southern California and our group of highly experienced engineers are available 24\/7 to assist and ensure that your business\u2019 IT infrastructure is running seamlessly.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity infrastructure is vital for your business continuity. We have talked in previous blog articles about some of the best ways to keep your business safe from outside attacks. It is, however, important to remember that not all threats or attacks come from the outside. What are Insider Threats Insider threats come from within the<\/p>\n","protected":false},"author":4,"featured_media":4465,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520],"tags":[558,690,720,682,571,556,689],"class_list":["post-4464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-business","tag-business-continuity","tag-cyber-awareness","tag-cyber-security","tag-it-services","tag-it-support","tag-remote-working"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding and Preventing Insider Threats<\/title>\n<meta name=\"description\" content=\"Cybersecurity infrastructure is vital for your business continuity. Insider Threats are a rising problem today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cardonet.com\/news\/insider-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding and Preventing Insider Threats\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity infrastructure is vital for your business continuity. Insider Threats are a rising problem today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cardonet.com\/news\/insider-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-20T10:19:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T10:19:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rachael\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rachael\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding and Preventing Insider Threats","description":"Cybersecurity infrastructure is vital for your business continuity. Insider Threats are a rising problem today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cardonet.com\/news\/insider-threats\/","og_locale":"en_US","og_type":"article","og_title":"Understanding and Preventing Insider Threats","og_description":"Cybersecurity infrastructure is vital for your business continuity. Insider Threats are a rising problem today.","og_url":"https:\/\/cardonet.com\/news\/insider-threats\/","og_site_name":"News","article_published_time":"2022-06-20T10:19:04+00:00","article_modified_time":"2022-06-20T10:19:07+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg","type":"image\/jpeg"}],"author":"Rachael","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rachael","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cardonet.com\/news\/insider-threats\/#article","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/"},"author":{"name":"Rachael","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35"},"headline":"Insider Threats","datePublished":"2022-06-20T10:19:04+00:00","dateModified":"2022-06-20T10:19:07+00:00","mainEntityOfPage":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/"},"wordCount":725,"commentCount":0,"publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg","keywords":["Business","Business Continuity","Cyber Awareness","Cyber Security","IT Services","IT Support","Remote Working"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cardonet.com\/news\/insider-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cardonet.com\/news\/insider-threats\/","url":"https:\/\/cardonet.com\/news\/insider-threats\/","name":"Understanding and Preventing Insider Threats","isPartOf":{"@id":"https:\/\/cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/#primaryimage"},"image":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg","datePublished":"2022-06-20T10:19:04+00:00","dateModified":"2022-06-20T10:19:07+00:00","description":"Cybersecurity infrastructure is vital for your business continuity. Insider Threats are a rising problem today.","breadcrumb":{"@id":"https:\/\/cardonet.com\/news\/insider-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cardonet.com\/news\/insider-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/insider-threats\/#primaryimage","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2022\/06\/Insider-threats.jpg","width":600,"height":334,"caption":"Insider threats"},{"@type":"BreadcrumbList","@id":"https:\/\/cardonet.com\/news\/insider-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"Insider Threats"}]},{"@type":"WebSite","@id":"https:\/\/cardonet.com\/news\/#website","url":"https:\/\/cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35","name":"Rachael","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=4464"}],"version-history":[{"count":0,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media\/4465"}],"wp:attachment":[{"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=4464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=4464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=4464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}