The human element in cybercrime

Issue 4 2021 Cyber Security

Keeping up with threat intelligence is a must for any security analyst today and the insider threat remains a huge part of any risk analysis. But, sadly, one of the main reasons the insider threat is often overlooked is because there is a lack of communication in terms of intelligence between the human resource department and the risk departments.


Jenny Reid.

Despite organisations believing that they have a safe cyber infrastructure, it is no coincidence that the human factor – long seen as the weakest link in the chain or the first line of defence – has often contributed to some of the most significant data breaches making headlines.

Often the investigations reveal that breaches resulted from lapses by employees who ignored warning signs of a potential breach and vulnerabilities within the system.

How to manage the insider threat?

There are areas where artificial intelligence can be used in conjunction with the human resources department to address risk more proactively. Sadly, in the traditional lifecycle of an employee, there is seldom a risk prevention element to it.

In conjunction with the risk professionals, an insider threat identification programme should be considered. It would include the following elements that will allow a company to understand the integrity and behaviour of a person before employment and regularly during employment, to be proactive in understanding the changing threats.

Identify possible risk behaviour patterns:

o Attempts to bypass security measures.

o Requests for higher-level access.

o Frequent use of equipment/systems outside regular working hours.

o Social media behaviour.

o Use of unauthorised external devices.

o Disgruntlement towards colleagues or employer regarding workplace policies.

o Change in work performance.

Understand what a high-risk user is:

o Monitor passwords.

o Monitor staff movement and activity, online and in person.

o Lifestyle audits.

o Understand employees’ intentions.

Include cyber threats in the hotline education to employees. 67% of tip-offs come from employees.

• Develop an employee screening policy that prevents risk to the organisation:

o Must consider failed applications.

o Must be legally compliant.

o Must have buy-in from the entire executive committee.

o Must be updated regularly to address current risks and consider past experience.

o Must not only be a pre-employment process, it must be ongoing.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Insights from the 2023 Cloud Security Report
News Cyber Security
Increased costs, compliance requirements, hybrid and multi-cloud complexities, reduced visibility, and a lack of skilled practitioners cause organisations to slow or adjust their cloud adoption strategies.

Read more...
New algorithm for OT cybersecurity risk management
Industrial (Industry) Cyber Security News Commercial (Industry)
OTORIO’s new risk management model and attack graph analysis algorithm technology, calculates OT cybersecurity threats and provides risk mitigation actions, prioritised according to actual exposure and potential impact on operations.

Read more...
Veeam finds 93% of cyberattacks target backup storage
Cyber Security
Veeam unveils the results of its 2023 Ransomware Trends Report, showing cyber insurance is becoming too expensive and 21% of organisations are unable to recover their data after paying the ransom.

Read more...
Cybersecurity providers must first protect themselves
Cyber Security
In a joint advisory released by cybersecurity agencies across the United States, UK, Australia, Canada and New Zealand, managed security service providers (MSSPs) have been warned of a sharp increase in cyberattacks targeting their systems.

Read more...
Cyber attackers used over 500 tools and tactics in 2022
Cyber Security News
The most common root causes of attacks were unpatched vulnerabilities and compromised credentials, while ransomware continues to be the most common ‘end game’ and attacker dwell time is shrinking – for better or worse.

Read more...
Addressing the SCADA in the room
Industrial (Industry) Cyber Security
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Read more...
Recession or stress?
Cyber Security News
The economic landscape has seen many technology companies lay off vast numbers of employees, but for cybersecurity, the picture looks very different – a dynamic mixture of excitement, challenges and toxicity.

Read more...
Vulnerabilities in industrial cellular routers’ cloud management platforms
Industrial (Industry) Cyber Security Security Services & Risk Management
Research from OTORIO, a provider of operational technology cyber and digital risk management solutions, unveils cyber risks in M2M protocols and asset registration that expose hundreds of thousands of devices and OT networks to attack

Read more...
NEC XON appoints Armand Kruger as Head of Cybersecurity
News Cyber Security
NEC XON has announced the appointment of Armand Kruger as the Head of Cybersecurity. Kruger will oversee all cybersecurity offerings including cybersecurity strategy, programmes, and executive advisory.

Read more...
Caesar Tonkin new head of cybersecurity business, Armata
News Cyber Security
Vivica Holdings has announced the appointment of cybersecurity expert Caesar Tonkin to head up its cybersecurity business Armata, which provides technology solutions and niche expertise needed to help businesses better protect themselves.

Read more...