Malicious Insider Threat

7th January 2020 | Cybrary Malicious Insider Threat


A Malicious Insider Threats occur when an insider uses their privileged access to a company’s resources and harms that organization’s data, systems, or IT infrastructure.  Malicious insider events include stealing and selling intellectual property to competitors, placing back-doors into systems and networks to access after termination, disgruntled employees who destroy critical systems or block access to critical files, systems, or services.  Each of these events is considered a purposeful, malicious, insider attack on a company.

A related term is the Accidental Insider Threat or Incident, in which an employee causes a security incident on accident.  Accidental incidents happen many ways such as exposing a database without properly securing it, not patching critical systems that subsequently are exploited, and responding to phishing attacks from hackers by sending them critical or sensitive information.

Both malicious and accidental insider events put your business at grave risk.

Related Terms: Accidental Insider Incident, Insider

What does this mean for an SMB?

As an SMB, there are some simple and easy ways to protect yourself against accidental and malicious incidents from insider:

  1. Implement the Principle of Least Privilege;
  2. Monitor systems to see where data is coming from and who is accessing it;
  3. Enable Data Loss Prevention technologies in your email to spot critical or sensitive data leaving your environment; and
  4. Train employees on the security basics including how to spot suspicious behaviors that could indicate a malicious insider.
  5. Develop a culture of “if you see something, say something”.

To learn more about the types of insider threats, watch this short video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more