The Insider Threat
Insider attacks are on the rise. According to a recent study, 83% of organizations have experienced at least one insider attack in the past year. And, 85% of cybersecurity leaders expect data loss from insider incidents to escalate in the next 12 months.
The U.S. Federal Government is not exempt from this trend. Insider threats come in a variety of forms—everything from malicious, covert actions of individuals within or connected to an agency to the unintentional loss or theft of data or end-user devices. Any actors with administrative privileges, whether legitimately provisioned or maliciously obtained, have the potential to inflict severe damage and present significant risks to an agency’s mission and national security.
Types of Insider Threats
Malicious Insider—someone who maliciously and intentionally abuses legitimate credentials, typically to steal information for financial or personal incentives. Malicious insiders have an advantage over other attackers because they are familiar with the security policies and procedures of an organization, as well as its vulnerabilities.
Careless Insider—a negligent employee or contractor who unknowingly exposes the system to outside threats. This is the most common type of insider threat, resulting from mistakes, such as leaving a device exposed or falling victim to a scam. For example, an employee who intends no harm may click on an insecure link, infecting the system with malware.
Mole—an imposter who is technically an outsider but has managed to gain otherwise valid insider credentials in order to access a privileged network, posing as an employee or contractor.