Every day, data walks out the doors of businesses around the globe. Sometimes this data exfiltration is unintentional, other times it’s malicious. Often what’s taken is harmless, but sometimes it’s valuable company IP or sensitive material. With IP accounting for 80 percent of a company’s value, the potential impact of insider threat is enormous. Fortunately, there are ways to predict which employees are most likely to commit an insider threat action. This infographic covers the six employee behavior archetypes that are most prone to insider threat and their behaviors. Learn what to watch out for to keep your business safe.
- The Ship Jumper: Workers who have accepted a new job are the most likely to give data to a competitor. In one common insider threat scenario, a sales representative leaves the company for a competitor, taking sales opportunities with him.
- The Unhappy Camper: The hosting service Code Spaces was forced to go out of business when an attacker gained access to their Amazon Web Services (AWS) control panel and deleted customer data and backups – all thanks to a disgruntled IT employee.
- The Spendthrift: Be wary of employees constantly talking about money problems: these folks may commit data theft or sabotage company systems for personal gain.
- The Angler: Beware employees who are always trying to game the system and exploit weaknesses in systems or their fellow employees.
- The Uploader: Employees using personal clouds are insider threats in many ways.
- The Ex: When office romance goes bad, some scorned lovers may seek to access personnel files or other personal information to “stalk” ex-lovers.
Learn more about the Six Archetypes of Insider Threat Below:
3 Steps to Mitigating Insider Threat Without Slowing Down Users