{"id":1588,"date":"2022-12-05T09:52:48","date_gmt":"2022-12-05T14:52:48","guid":{"rendered":"https:\/\/securityeverafter.com\/?p=1588"},"modified":"2023-01-30T08:53:09","modified_gmt":"2023-01-30T13:53:09","slug":"what-are-insider-threats-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/what-are-insider-threats-in-cybersecurity\/","title":{"rendered":"What are Insider Threats in Cybersecurity?"},"content":{"rendered":"
<\/p>\n<\/div>\n
Insider Threats in cybersecurity can be employees, contractors, vendors, or visitors, and their intent can be either intentional or accidental.<\/p>\n
An example scenario where this might happen is in the healthcare industry. Medical providers often need to move information about patients across poorly integrated systems. Wanting to get their job done, the provider might decide to circumvent technology tools and plug in a USB drive to help speed things up. This USB drive might then extract sensitive information and provide it to others who do not need it.<\/p>\n
Another example of USB risks is when a vendor or service provider needs to perform maintenance on specialized medical equipment. They use a USB to transfer essential configuration files, which leads to sharing malware acquired from previous clients. Triggers that may warrant additional focus include employment actions, including resignation, termination, job transfer, or the individual becoming disgruntled or unhappy with their working conditions.<\/p>\n
<\/p>\n<\/div>\n
You must plan for this risk in advance to reduce the likelihood of Cybersecurity Insider Threats in your company.<\/p>\n
Specific steps include:<\/p>\n
And it applies whether you are a seasoned cyber professional, you are new to your cyber professional role, or you are wondering what rattles around in the mind of a cybersecurity professional.<\/p>\n