Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb

Insider Threat: Research Proves Loyalty Can Be a Rare Commodity

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The research surveyed 1,500 UK office workers and was conducted in April.

Right out of the gate, more than half of respondents (59%) admitted that at some point they had taken company information from a corporate network or devices.

Now, some of that was completed personal work and is necessary. But contact details of clients (11%), confidential market information about the company or customers' companies (7%) and details of the sales pipeline (6%) were also taken by employees. It seems that if they can access the information, they can take it.

Seven percent of the total pool of workers said they had used or accessed company assets including passwords to subscription services (i.e. external databases, content subscriptions, company benefits) (9%), sensitive information relating to colleagues (7%) , company or customer credit card details (6%) and intellectual property (i.e. product specifications, product code, patents) (6%).

The report tries to look at why an employee would do this, what motivated them. Researchers found that 7% of respondents took company information because "they knew it would be of value to a third-party organization"; this rose to 12% if a worker had been with the company for three to four years.

Ah. They can get money for it. They think so, anyway.

In fact, the report finds that 15% of all UK employees would hand over corporate information for £1,000 (about $1,260). And that's for the good 3rd-party-is-interested-stuff.

Ten percent of all workers said they'd sell intellectual property, like product specifications and source code, for £250 (about $315) or less.

The employee's age is involved here. 19% of all employees in graduate-level roles averred that they were paid to source information for a third-party. Since 29% of office workers aged between 16 and 24 report that they have been approached by an outsider looking for company data, there is a correlating double digit rise in the percentage of third-party attempts to gain information from younger employees.

Exfiltrated corporate data can be placed on many different hardware devices (think USB stick), but the report says that 8% of those stealing information also reported using "cyber tools" to hide and exfiltrate company information (such as steganography or encryption). That means trying to watch for enterprise data before it goes out the door is getting harder.

Insider threats have to be part of a security posture, yet a low-visibility but connected worker should be thought of as much of a threat as anyone else to enterprise information.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.