Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

5/31/2019
06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Insider Threat: Research Proves Loyalty Can Be a Rare Commodity

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The research surveyed 1,500 UK office workers and was conducted in April.

Right out of the gate, more than half of respondents (59%) admitted that at some point they had taken company information from a corporate network or devices.

Now, some of that was completed personal work and is necessary. But contact details of clients (11%), confidential market information about the company or customers' companies (7%) and details of the sales pipeline (6%) were also taken by employees. It seems that if they can access the information, they can take it.

Seven percent of the total pool of workers said they had used or accessed company assets including passwords to subscription services (i.e. external databases, content subscriptions, company benefits) (9%), sensitive information relating to colleagues (7%) , company or customer credit card details (6%) and intellectual property (i.e. product specifications, product code, patents) (6%).

The report tries to look at why an employee would do this, what motivated them. Researchers found that 7% of respondents took company information because "they knew it would be of value to a third-party organization"; this rose to 12% if a worker had been with the company for three to four years.

Ah. They can get money for it. They think so, anyway.

In fact, the report finds that 15% of all UK employees would hand over corporate information for £1,000 (about $1,260). And that's for the good 3rd-party-is-interested-stuff.

Ten percent of all workers said they'd sell intellectual property, like product specifications and source code, for £250 (about $315) or less.

The employee's age is involved here. 19% of all employees in graduate-level roles averred that they were paid to source information for a third-party. Since 29% of office workers aged between 16 and 24 report that they have been approached by an outsider looking for company data, there is a correlating double digit rise in the percentage of third-party attempts to gain information from younger employees.

Exfiltrated corporate data can be placed on many different hardware devices (think USB stick), but the report says that 8% of those stealing information also reported using "cyber tools" to hide and exfiltrate company information (such as steganography or encryption). That means trying to watch for enterprise data before it goes out the door is getting harder.

Insider threats have to be part of a security posture, yet a low-visibility but connected worker should be thought of as much of a threat as anyone else to enterprise information.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.