Frontpage » Trojan Horse

Trojan Horse

executive-team-listening-to-contrary-views-from-colleague-picture-id1272326797

November 15, 2022

According to risk and security firm Kroll, insider cyber-threat soared to its highest quarterly level ever in Q3 2022. Insiders accounted for more than one/third of all unauthorized access threat incidents. Many of the cases Kroll observed coincided with employee terminations. In one example, an employee attempted to steal gigabytes worth of data by copying it over to cloud storage networks. The company followed its standard protocol, which included disabling the user’s accounts and deleting data from cloud storage accounts accessible to them, but months after the employee left for a competitor, the previous employer began to suspect that he was using company data to boost sales. Kroll created a timeline of activity showing the movement of confidential files across multiple personal emails, cloud storage accounts and physical devices. Activity largely coincided with suspicious search terms, indicating that the user knew the activity was wrong and made a deliberate effort to cover his tracks. The article includes a list of best practices for defending against insider threats.

Share this post:

Find this article interesting?

Sign up for more with a complimentary subscription to Today’s General Counsel magazine.