The insider threat

February 2019 Asset Management, EAS, RFID, Integrated Solutions, Logistics (Industry)

Sitting in your office doing what you are doing as a C-suite gate-keeper or other senior management role, you proceed with your to-do things daily, as you should. You are doing exactly what you are supposed to be doing and what you are paid for. Or are you?

Talking about risk we understand that threats to our work environment come in different guises such as physical attacks to the business that include robbery or business break-ins or theft. Other threats present themselves in the form of cyber-attacks and IP theft (industrial espionage).

Andre Du Venage.
Andre Du Venage.

Considering logistics and warehousing operations, normally these threats are viewed from an outside-in perspective and most security is concentrated on keeping outsiders outside and away from goods manufactured or goods stored/ kept in warehouses. The security focus typically involves physical measures that include a good perimeter, security protection, armed response, access controls, visitors’ policy, vehicle tracking and monitoring, staff controls and standard operating procedures. This should be standard practise and the bare minimum for operations.

But when we talk insider threat, the question arises as to what do we do to keep the insider threat at bay. Insider refers to the staff member (permanent or contract) colluding in some way with outsiders to steal from the operation, normally in bulk, to effect a substantial loss. Insiders can also collude with other insiders to engage in criminal acts to hurt the company in different ways.

More questions that arise include:

• How do we keep the insider from colluding with other parties inside or outside?

• If the insider engages in illegal activity, how do I expose the person?

• Are there red flags to look out for?

• How do I handle the concern if red flags pop up?

Make a plan

The starting point to answer these operational questions lies with policies and procedures. An SOP on each business activity is essential not just for ensuring operations are taking place according to the sales plan, but also to the security risk plan. Does your company have a security risk plan? If not you need to start there and get staff aware that your business will defend against insider attack.

Having witnessed truck hijackings and bulk cargo theft first hand over many years, it came to mind that the attack will happen due to the fact that the system will be tested by criminals in their eagerness and greed to get their hands on other peoples’ property because it is an easy way to earn a living. The fact that it is not an honest living is of no consideration to most thieves.

What makes the difference in being repeatedly attacked is the response to the attack. If the response is weak, the attacks will continue. If the response is good and the attackers are apprehended or forced to leave the hijacked truck next to the road due to security counter-measures, then the attacks will dissipate.

The same principle applies to other operations in that if the attackers understand that once they attack, they themselves will become the target (of the security response) then they will think twice before trying that again. We need to act on insiders in a concise and effective way in order to create uncertainty and fear in the mind of the next person planning an attack.

Red flag alert

Insiders expose themselves by way of red flags popping up in operations that may start with absenteeism, right through to negligence or more open incidents of theft.

Insider threat manifests when company operations flow such that it opens doors to opportunity for crimes or outsiders are hired to infiltrate the organisation and go unnoticed. This article does not go into the motivations insiders have to commit theft, but often opportunity arrives by accident due to grey areas in the business operations.

It takes a concerted security risk management effort to identify and expose criminal insiders. The easier option would be to deter or deflect such opportunists and criminals from the operation by closing operational gaps and opportunities for crime. Each business must consider its own unique environment that includes product, staff make-up, policies and procedures.

The insider threat will always remain so the best approach is to identify the operational gaps that create opportunity, hire knowledgeable security staff and a strong security leader (with influence). The CEO/COO/MD should be the person the security leader reports to in most operations. The security manager needs to champion the security process and show progress and results, and this includes an active programme to also focus inside to the internal risks.

For more information, contact Andre Du Venage, Secure Logistics, +27 11 391 6268, andre@securelogistics.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Scanning for gold
Issue 8 2020, Saflec , Asset Management, EAS, RFID, Products
The metal detection market is such that customers looking for a specific point solution are becoming a rarity and the primary desire is for a solution.

Read more...
Geutebrück releases latest management system
Issue 2 2021 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
G-SIM X Panopticon, the latest release of Geutebrück's management system, integrates additional features designed for more rapid and cost-effective setup, enhanced intuitive operation, and multi-site networking.

Read more...
Dealing with farm attacks
Issue 2 2021, Technews Publishing , Editor's Choice, Integrated Solutions, Security Services & Risk Management, Agriculture (Industry)
Brutal farm attacks are unfortunately a common event in South Africa. Laurence Palmer suggests a proactive, community-based approach as the optimal way to prevent these heinous crimes from happening in the first place.

Read more...
First cameras based on inteox open camera platform
Issue 2 2021, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
MIC inteox 7100i cameras support predictive solutions with machine learning, deep neural network-based video analytics, and third-party software apps for customised applications.

Read more...
Manufacturer adopts touchless biometrics and temperature screening
Issue 1 2021 , Asset Management, EAS, RFID, Industrial (Industry)
Leading implantable plastics manufacturer adopts touchless biometrics and temperature screening via IXM TITAN with Enhancement Kit for workforce management and to safeguard employee health.

Read more...
Dahua to build open and smart NVR ecosystem
Issue 1 2021, Dahua Technology South Africa , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
From initial connection demands of third-party IPC and PTZ suppliers, demands of alarm sensor and platform manufacturers, to demands of algorithm and app developers, the NVR is playing an increasingly significant role in connecting front-end devices and other equipment.

Read more...
What happens to your data when you leave the estate?
Residential Security Handbook 2021: Smart Estate Living , Vox , Asset Management, EAS, RFID
COVID-19 infections and the imminent enforcement of the Protection of Personal Information Act (POPIA) on 1 July 2021 have put business and residential estate visitor management under the spotlight from both a health and a data privacy perspective.

Read more...
Milestone launches local office and showroom
Issue 2 2021, Milestone Systems , News, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Milestone Systems recently launched its first official showroom in Johannesburg where partners can bring customers and demonstrate what the solutions they offer are capable of doing.

Read more...
Ensuring the secure flow of information
Issue 9 2020 , Asset Management, EAS, RFID
The recent leak of two matric exam papers and arrest of a suspect has raised renewed concerns over security and data leaks within a corporate and public organisation environment.

Read more...
Information keeps the trucks rolling
Issue 9 2020 , Asset Management, EAS, RFID
Elite Truck Hire harnesses the power of information to optimise its business and prevent fraud with FleetDomain.

Read more...