Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

5/31/2019
06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Insider Threat: Research Proves Loyalty Can Be a Rare Commodity

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The research surveyed 1,500 UK office workers and was conducted in April.

Right out of the gate, more than half of respondents (59%) admitted that at some point they had taken company information from a corporate network or devices.

Now, some of that was completed personal work and is necessary. But contact details of clients (11%), confidential market information about the company or customers' companies (7%) and details of the sales pipeline (6%) were also taken by employees. It seems that if they can access the information, they can take it.

Seven percent of the total pool of workers said they had used or accessed company assets including passwords to subscription services (i.e. external databases, content subscriptions, company benefits) (9%), sensitive information relating to colleagues (7%) , company or customer credit card details (6%) and intellectual property (i.e. product specifications, product code, patents) (6%).

The report tries to look at why an employee would do this, what motivated them. Researchers found that 7% of respondents took company information because "they knew it would be of value to a third-party organization"; this rose to 12% if a worker had been with the company for three to four years.

Ah. They can get money for it. They think so, anyway.

In fact, the report finds that 15% of all UK employees would hand over corporate information for £1,000 (about $1,260). And that's for the good 3rd-party-is-interested-stuff.

Ten percent of all workers said they'd sell intellectual property, like product specifications and source code, for £250 (about $315) or less.

The employee's age is involved here. 19% of all employees in graduate-level roles averred that they were paid to source information for a third-party. Since 29% of office workers aged between 16 and 24 report that they have been approached by an outsider looking for company data, there is a correlating double digit rise in the percentage of third-party attempts to gain information from younger employees.

Exfiltrated corporate data can be placed on many different hardware devices (think USB stick), but the report says that 8% of those stealing information also reported using "cyber tools" to hide and exfiltrate company information (such as steganography or encryption). That means trying to watch for enterprise data before it goes out the door is getting harder.

Insider threats have to be part of a security posture, yet a low-visibility but connected worker should be thought of as much of a threat as anyone else to enterprise information.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.