Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

5/31/2019
06:00 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Insider Threat: Research Proves Loyalty Can Be a Rare Commodity

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The UK's Deep Secure has reported this week that the price an employee would accept to break loyalty with an organization may be a lot less than has been previously thought.

The research surveyed 1,500 UK office workers and was conducted in April.

Right out of the gate, more than half of respondents (59%) admitted that at some point they had taken company information from a corporate network or devices.

Now, some of that was completed personal work and is necessary. But contact details of clients (11%), confidential market information about the company or customers' companies (7%) and details of the sales pipeline (6%) were also taken by employees. It seems that if they can access the information, they can take it.

Seven percent of the total pool of workers said they had used or accessed company assets including passwords to subscription services (i.e. external databases, content subscriptions, company benefits) (9%), sensitive information relating to colleagues (7%) , company or customer credit card details (6%) and intellectual property (i.e. product specifications, product code, patents) (6%).

The report tries to look at why an employee would do this, what motivated them. Researchers found that 7% of respondents took company information because "they knew it would be of value to a third-party organization"; this rose to 12% if a worker had been with the company for three to four years.

Ah. They can get money for it. They think so, anyway.

In fact, the report finds that 15% of all UK employees would hand over corporate information for £1,000 (about $1,260). And that's for the good 3rd-party-is-interested-stuff.

Ten percent of all workers said they'd sell intellectual property, like product specifications and source code, for £250 (about $315) or less.

The employee's age is involved here. 19% of all employees in graduate-level roles averred that they were paid to source information for a third-party. Since 29% of office workers aged between 16 and 24 report that they have been approached by an outsider looking for company data, there is a correlating double digit rise in the percentage of third-party attempts to gain information from younger employees.

Exfiltrated corporate data can be placed on many different hardware devices (think USB stick), but the report says that 8% of those stealing information also reported using "cyber tools" to hide and exfiltrate company information (such as steganography or encryption). That means trying to watch for enterprise data before it goes out the door is getting harder.

Insider threats have to be part of a security posture, yet a low-visibility but connected worker should be thought of as much of a threat as anyone else to enterprise information.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...