{"id":54834,"date":"2023-03-27T13:23:19","date_gmt":"2023-03-27T13:23:19","guid":{"rendered":"https:\/\/sectona.com\/?p=54834"},"modified":"2023-03-27T13:32:22","modified_gmt":"2023-03-27T13:32:22","slug":"insider-threats-and-mitigation","status":"publish","type":"post","link":"https:\/\/sectona.com\/technology\/insider-threats-and-mitigation\/","title":{"rendered":"Cyber Security 101: Insider Threats and Mitigation"},"content":{"rendered":"\n

Insider threats refer to security breaches committed by employees with access to information about internal security practices, data, and systems. Data breaches, leaks of sensitive information, and tarnished reputations are a few consequences of insider threats. Insider threats have become a pressing issue in recent years. Targeted attacks by disgruntled employees, and human error are adding to sophisticated external cyber-attacks. <\/p>\n\n\n\n

Every year, many organisations fall victim to such attacks. And in many cases, insiders do not realise the potential breach while involved in it. This is the case of a lack of awareness of what to and what not to do with an organisation\u2019s data and systems. <\/p>\n\n\n\n

For example, after obtaining a job offer from The Trade Desk, Yahoo research scientist Qian Sang\u202fstole<\/a> AdLearn product data in May 2022<\/a>. He downloaded 570,000 pages of Yahoo\u2019s IP to his devices, anticipating it would help him in his new position. After a few weeks, Yahoo realised that and issued Sang a cease-and-desist letter for stealing data and intellectual property of The Trade Desk. <\/p>\n\n\n\n

An economic atmosphere like a recession often sets the stage for internal security threats when laid-off employees may become more anxious and resentful. Also, companies tend to induce severe cost-cutting during this rough period and often pay less attention to cybersecurity. This is because cybersecurity is perceived as preventive and non-mandatory. This can lead to severe consequences and cyberattacks in the form of insider threats.\u202f <\/p>\n\n\n\n

What are the Types of Insider Threats in Cyber Security? <\/h2>\n\n\n\n