A Threat Actor is a person or group performing malicious or hostile actions which cause harm to the victims computers, devices, systems, or networks. Threat Actors are categorized into groups based on their motivations and affiliations. CyberHoot has listed out the five main Threat Actors groups we face online today:
Current or former employees, contractors, or consultants who have access to an organization’s networks, systems, or data and can be broken down further into two specific groups:
Malicious insider Threats intentionally exceed or misuse their access in a manner that negatively affects the confidentiality, integrity, or availability of the organization’s data and/or information systems.
Accidental insider Threats unintentionally cause damage to their organization’s information systems through their actions, such as clicking on malicious links in a phishing email, or inaction, such as not setting access restrictions on Non-Public-Personal-Information (NPPI) or Personally Identifiable Information (PII)
Politically, socially, or ideologically motivated threat actors who target victims for publicity or to effect change, which can result in high profile events
Not typically motivated by monetary gain or the theft of IP, mostly hacking for a cause. Terrorist organizations are sometime included in Hacktivist grouping
The best way to defend against Threat Actors is simply practicing good cybersecurity hygiene along with proper technical measures. SMBs are often targets of these threats, hackers know that smaller companies tend to think they aren’t at risk of an attack, oftentimes lacking cybersecurity measures in their company. To minimize the chances of becoming victim of an attack, follow CyberHoot’s best practices:
Train employees on cybersecurity basics, helping them become more aware of the threats they face when interacting online. (Phishing, Social Engineering Attacks)
Phish Test Employees
Govern employees with the proper policies, following NIST Guidelines (WISP, Acceptable Use, Password Policy, etc)
Employ a Password Manager, require it in your Password Policy
Enable Two-Factor Authentication wherever possible
Work with your IT staff or third party vendors to ensure your critical data is being encrypted properly