HN0918- What to Do When an Employee Becomes a Cybercriminal 1402×672
HN0918- What to Do When an Employee Becomes a Cybercriminal 1402×672
HN0918- What to Do When an Employee Becomes a Cybercriminal 1402×672
HN0918- What to Do When an Employee Becomes a Cybercriminal 1402×672
HN0918- What to Do When an Employee Becomes a Cybercriminal 1402×672

What to Do When an Employee Becomes a Cybercriminal

Sept. 1, 2018
The FBI caught David Yen Lee at his home before he could depart for the airport where his flight was waiting. The hard drives the FBI sought were in his […]

The FBI caught David Yen Lee at his home before he could depart for the airport where his flight was waiting. The hard drives the FBI sought were in his possession. On those drives were the trade secrets of a very well-known USA-based paint company, and David had purchased a one-way ticket to Shanghai, China, where he intended to illegally hand over those trade secrets to Nippon Paint. He served over a year in prison for his crime.

Today’s cybercriminals come at your company from many angles. Their motivations are often more practical than many law-abiding citizens would expect:

Profit. They want money, and you have information they can monetize.

Influence. They can use data to manipulate business or personal situations in their favor.

Power. If your company dominates an industry or owns critical trade secrets, others wish to take that power away from you and use it for their own advantage. Cybercrime is one way to accomplish that goal.

Motives such as these change the way cybercriminals operate. They are organized. They share information amongst each other. They are often well-funded. These things make them more dangerous. In the example above, David Yen Lee is an internal cybercriminal. He is one of your employees.

This is a difficult topic. While it’s true that internal employees are responsible for a large number of cybersecurity breaches, it’s also true that most of these are unintentional. They are a result of good people doing something they shouldn’t, either out of ignorance or because a cybercriminal tricked them into doing it (if you saw the movie Catch Me if You Can this is Frank Abagnale’s social-engineering behavior).

Statistics on the exact percentage of "insider" cyber breaches that are deliberate vs. inadvertent vary widely, but the opinion can be held that the vast majority of insider threats are not malicious.

No matter which statistic you believe, everyone agrees that many insider threats would have been prevented if the insider had understood how his or her behavior allowed a breach to occur. It’s easy to see why a good cybersecurity awareness training program is so important to the success of your company.

With that being said, there is a risk of an employee with malicious intent to breach your sensitive data. Whether it be to share sensitive details to a competitor, profit from your data, or a disgruntled employee looking to carry out revenge against your company. If your company falls victim of a malicious-intentioned employee, finding out what happened is even more difficult because they often have high level system privileges that allow them to erase their tracks.

If your company is one of the unlucky ones where an insider deliberately caused a security breach, then you are automatically in the highest risk category of those susceptible to cybercrime. The keys to mitigate this risk are simple:

Educate Your Employees
• Establish a strong mandatory and frequent cybersecurity awareness training program for your employees that clearly lays out the policy for cybersecurity and the consequences of violating the policy.
• Don’t allow employees to take home devices that contain sensitive files due to the risk of the device being stolen or sensitive data being transmitted over insecure networks at their home or other locations.
• Instruct your employees to never share their passwords.

Know Your People
• Perform background checks on your employees to assist in identifying those who may take deliberate actions that would harm your company.
• Know which people have access to the most sensitive data.

Guard Your Most Sensitive Data
• Limit your employees’ ability to obtain access (intentional or unintentional) to sensitive information via a least-privileged approach to your data.
• Identify your most sensitive and valuable data. Then assign that data the highest safeguarding and most persistent monitoring.
• Remove "local administrator privileges" from your users to their company-provided laptops or desktops. A "local administrator" is someone who can do anything he or she chooses to with a computer, such as install programs, delete files, change sensitive security settings, and so on.
• Turning on "egress filtering" on your network and limiting the use of USB "thumb drives" will make it harder for anyone to make copies of it and move them outside of your organization.

Ensure That You Have Forensics Available to You
• Tracking down an internal cybercriminal requires logging of network activity, especially for any access to sensitive information.
• Any logs need to be stored in an area that is limited to the fewest number of employees as possible.

In short, your employees are your most valuable asset, but can also be your greatest liability. They need to be trained on best practices to keep your data safe, and they also need to understand that you have forensic systems in place that will likely catch them if they attempt to access data they should not. A "trust but verify" approach regarding employee access to your critical intellectual property is an important part of your company’s cybersecurity program.

About the Author: Bryce Austin is the CEO of TCE Strategy, an internationally-recognized speaker on emerging technology and cybersecurity issues, and author of Secure Enough? 20 Questions on Cybersecurity for Business Owners and Executives. With over 10 years of experience as a Chief Information Officer and Chief Information Security Officer, Bryce actively advises companies across a wide variety of industries on effective methods to mitigate cyber threats. For more information, please visit www.BryceAustin.com.

About the Author

Human Network Contributor

If you're interested in contributing an article, please email Sharon Vollman, Editorial Director, [email protected], or Lisa Weimer, Managing Editor, ISE Magazine, [email protected].