{"id":597,"date":"2023-03-31T13:00:46","date_gmt":"2023-03-31T13:00:46","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/03\/31\/biggest-insider-threats-of-2022-and-key-takeaways-for-2023\/"},"modified":"2023-03-31T13:00:46","modified_gmt":"2023-03-31T13:00:46","slug":"biggest-insider-threats-of-2022-and-key-takeaways-for-2023","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/03\/31\/biggest-insider-threats-of-2022-and-key-takeaways-for-2023\/","title":{"rendered":"Biggest Insider Threats of 2022 and Key Takeaways for 2023"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-340766 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/03\/29120124\/Biggest-Insider-Threats-of-2022-lessons-learned-and-key-takeaways-for-2023.jpg\" alt=\"Biggest Insider Threats of 2022 lessons learned and key takeaways for 2023\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/03\/29120124\/Biggest-Insider-Threats-of-2022-lessons-learned-and-key-takeaways-for-2023.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/03\/29120124\/Biggest-Insider-Threats-of-2022-lessons-learned-and-key-takeaways-for-2023-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/03\/29120124\/Biggest-Insider-Threats-of-2022-lessons-learned-and-key-takeaways-for-2023-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>At the end of 2022, many cybersecurity companies published annual reports on the cybersecurity sector. Evolving and sophisticated attacks, scarcity of cyber resources, changes in data privacy laws, and highly experienced and trained bad actors are some of the cyber demons that tortured businesses and cybersecurity professionals throughout 2022. Additionally, these reports mentioned the insider threat lurking in the physical, digital, and cognitive domains and involving businesses\u2019 most trusted entities: humans.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Businesses tend to underestimate the insider threat. They must realize that new trends such as working from anywhere, BYOD policies, phishing, smishing, and AI chatbot technology coupled with untrained, disgruntled, or disappointed employees increase the insider threat. Instead, businesses focus their concerns on securing the perimeter of their infrastructures to improve their cybersecurity posture and protect their tangible and intangible assets from outsiders\u2019 cybercriminal activities. Undoubtedly, the insider threat shall not be overlooked.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">The Insiders<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">An insider is every person who works for a business and contributes directly or indirectly towards its wealth and evolution. Insiders can be employees, partners, and contractors valuable to each company. They are an asset for every organization, but can also become a significant threat if overlooked.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">What Are the Signs of Insider Threats?<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The working environment evolves and gets more dispersed. Nowadays, employees enjoy working conditions from the comfort of their homes. They are allowed to use their personal computers for their work, the same they use to surf the internet and their social media world. They may even store their companies\u2019 sensitive data, customers\u2019 bio-data, and clients\u2019 addresses on their laptop\u2019s hard drive and plug their friend\u2019s USB to copy a few photos of last weekend\u2019s party. Negligence is a significant factor, but not the only one; employees can be malicious to leverage benefit out of their illegal acts.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Insider threats can be grouped into one of the following categories: a careless worker, a credential thief, or a malicious insider. Organizations must continuously oversee their operations and their insiders for signs that may trigger the \u201cdanger bell.\u201d<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to <i>ComputingEdge<\/i> Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">These signs involve human behavior that deviates from the security framework and can be:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li>Lack of training to comprehend the applicable laws and the regulatory requirements.<\/li>\n<li>Unawareness of the actions needed to protect the security of their devices, both BYODs and business-supplied.<\/li>\n<li>Unintentional transmission of sensitive private data to an unprotected cloud location.<\/li>\n<li>Violation of security regulations for the sake of simplicity.<\/li>\n<li>Devices that haven\u2019t been updated to the most recent version.<\/li>\n<li>Remote access during off-hours, unexplained data exportation, and absence of vacation requests for prolonged intervals.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Facts and Impact of 2022\u2019s Insider Threats<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">The impact of insider threats exponentially increases the direct and indirect costs for a business. Illegal activities and employees\u2019 negligence impact organizational productivity, damage assets, increase the cost for a company to detect and remediate systems and processes, and have a legal and regulatory impact. Furthermore, businesses that suffer an insider attack lose confidence and trust among key stakeholders while diminishing their marketplace brand and reputation.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">According to Ponemon Institute 2022 Cost of Insider Threats report:<\/p>\n<ul style=\"padding-left: 5%; color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em; list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\n<li>Insider threat incidents have increased by almost 50% over the last two years and have become more frequent.<\/li>\n<li>The larger the organization, the more insider threat incidents.<\/li>\n<li>Critical business information and sensitive data can be found in employees\u2019 emails.<\/li>\n<li>The cost of credential theft to organizations increased to 65%.<\/li>\n<li>The mean containment time for an insider incident increased from 77 to 85 days. Incidents that took over 90 days to contain cost organizations $17.19 million on average.<\/li>\n<li>More than half of the attacks were caused by negligence, while 1 out of 4 was by malicious insiders; the rest involved credential theft.<\/li>\n<li>3 out of 4 respondents mentioned that malicious insiders use corporate email to steal sensitive data.<\/li>\n<li>Advanced technologies, such as user behavior-based tools, AI, and machine learning, are important to prevent, investigate, contain, and remediate insider incidents.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Threat awareness and things to do<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">It is a positive sign that more organizations and businesses are aware of insider threats. According to Gurucul\u2019s 2023 report, insider threats are a top concern for most organizations, while 75% of the respondents admitted they feel vulnerable to insider threats.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Businesses are trying to prepare themselves against evolving threats, although in many cases \u2013 especially across the cloud \u2013 they need more technical capabilities to detect and prevent them. The desire to become the best in their field puts them at a higher risk of insider threats. Wanting to go digital, the ongoing migration to the cloud, the accelerating use of endpoint and internet of things (IoT) devices, alongside the adoption of other strategies, always makes a company more vulnerable.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">No matter how well the digital perimeter of a company is safeguarded, insider activity is difficult to control and can severely affect every company. The dangers posed by workers who may unintentionally disclose information due to carelessness or simple errors or by malicious insiders who steal sensitive material on purpose for personal gain must be addressed by organizations effectively. Some actions companies must consider to battle insider threats include tailored and engaging security awareness training, educational programs on the new threats, internal cybersecurity audits, and the use of specialized software products.<\/p>\n<p>\u00a0<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">About the Author<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Christos Flessas is a Communications and Information Systems Engineer with more than 30 years of experience as an Officer of the Hellenic Air Force (HAF). He is an accredited NATO tactical evaluator in the Communication and Information Systems (CIS) area and the National Representative (NatRep) at Signal Intelligence CIS and at Navigation Warfare (NavWar) Working Groups. Christos holds an MSc in Guided Weapon Systems from Cranfield University, UK. He has also attended numerous online courses such as the Palo Alto Networks Academy Cybersecurity Foundation course. His experience covers a wide range of assignments, including radar maintenance engineer, software developer for airborne radars, IT systems manager, and Project Manager implementing major armament contracts.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Christos is intrigued by new challenges, open-minded, and excited about exploring the impact of cybersecurity on industrial, critical infrastructure, telecommunications, financial, aviation, and maritime sectors. Christos is also a writer for Bora.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/key-takeaways-from-2022-cyberthreatseaways-for-2023\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] At the end of 2022, many cybersecurity companies published annual reports on the cybersecurity sector. Evolving and sophisticated attacks,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":598,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,2,570],"tags":[],"class_list":["post-597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-tech-news-post","category-threats"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=597"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/598"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}