Eleven percent of companies in SA suffered malicious actions by staff

January 2024 Information Security, News & Events

Cyber incidents caused by the human factor are usually attributed to occasional employee errors, but a more important element often overlooked is deliberate malicious behaviour by staff. A new Kaspersky study found that in the past two years, 82% of companies surveyed in South Africa have faced cyber incidents in different forms, 11% of which were caused by deliberate malicious behaviour by employees.

There are two main types of insider threats: unintentional and intentional. Unintentional or accidental threats are employee mistakes such as falling for phishing and other social engineering methods, or sending sensitive and confidential information to the wrong person, etc.

In contrast, intentional threats are perpetrated by malicious insiders who deliberately hack into their employer’s systems. They usually do so for financial gain from the sale of sensitive data or as an act of revenge. Malicious insiders aim to disrupt or stop an organisation's regular business operations, expose IT weaknesses and obtain confidential information.

Insiders with malicious intentions are the most dangerous employees who can provoke cyber incidents. Several factors complicate threats posed by their actions:

• Insiders have specific knowledge of an organisation’s infrastructure and processes, including understanding the information security tools used.

• They are already inside the company's network and do not need to penetrate the perimeter from outside via phishing, firewall attacks, etc.

• They have colleagues and friends within the organisation, so it is much easier for them to use social engineering.

• Insiders with malicious intentions are highly motivated to harm their organisation.

Financial gain is one of the main reasons employees commit malicious actions against an employer. Often, it means stealing sensitive information with the intention of selling it to a third party or competitors, or even auctioning it on the dark web, where cybercriminals buy data to attack businesses.

When an employee has been fired, malicious behaviour might occur out of revenge. This can be conducted through their connections with other employees, but the worst-case scenario occurs if they still can log into their work account remotely because the organisation has not removed their ability to access corporate systems.

Employees can also act maliciously when unhappy with their jobs or ‘to get even’ with an employer who did not give them an expected raise or a promotion.

Another distinctive type of malicious action occurs when one or more insiders collaborate with an external actor to compromise an organisation. These incidents frequently involve cybercriminals recruiting one or more insiders to carry out different kinds of attacks. There may also be cases in which third parties, such as competitors or other interested parties, collaborate with staff to obtain the company’s sensitive data.

“Malicious actors can be discovered anywhere, in huge enterprises or small businesses. That is why businesses should build an up-to-date, resilient, transparent IT security system, uniting effective security solutions, smart security protocols and training programs for both IT and non-IT staff to safeguard against this threat. Additionally, it is crucial to implement products and solutions that will protect the organisation’s infrastructure. For example, our Kaspersky Endpoint Detection and Response Optimum contains Advanced Anomaly Control, which helps detect and prevent suspicious and potentially dangerous activities, both by an insider working in a company or an actor outside the organisation,” comments Alexey Vovk, Head of Information Security at Kaspersky.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
Africa’s largest Zero Trust platform
NEC XON Information Security Commercial (Industry)
Africa has reached a significant cybersecurity milestone with the successful deployment of the continent’s largest Palo Alto Networks Prisma Access and Prisma Access Browser Zero Trust environment, supporting secure remote access for more than 40 000 users for a large enterprise in Africa.

Read more...
Supply chain attacks top threat over 12 months
Information Security
Supply chain attacks have become the most prevalent cyberthreat confronting businesses over the past year, according to a new Kaspersky global study, with nearly one-third of companies worldwide experiencing a supply chain threat in the past year.

Read more...
From vibe hacking to flat-pack malware
Information Security AI & Data Analytics
HP issued its latest Threat Insights Report, with strong indications that attackers are using AI to scale and accelerate campaigns, and that many are prioritising cost, effort, and efficiency over quality.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Microsoft 365 security is a ticking time bomb
Information Security
Across boardrooms and IT departments, a dangerous assumption persists that because data is stored in Microsoft 365 and Azure, it is automatically secure. This belief is fundamentally flawed and fosters a false sense of protection.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.