When the COVID-19 lockdowns began in March 2020, the number of remote workers surged from 9% to 77% in a matter of weeks; a transition that more than half of the firms surveyed by Iometrics and Global Workplace Analytics acknowledge they were unprepared to make.Recognizing an opportunity to exploit the crisis, cybercriminals quickly launched a massive phishing campaign targeting consumers and remote workers. According to the Cybersecurity and Infrastructure Security Agency (CISA), insider security breaches skyrocketed, increasing 47% over 2018 and driving a 31% increase in average costs to $11.45M.What could account for this massive increase in insider threats? Does working from home make employees more likely to behave like cyber criminals? The short answer? No. Malicious intent is only rarely involved.Compromised insiders who are often unaware that their systems, credentials, or access privileges have been appropriated by an external threat actor. Careless or negligent insiders who cause harm inadvertently. For example, an employee sends an email containing personally identifiable information to the wrong email address. Incidents caused by negligent insiders cost organizations the least, “only” $307,111 on average. But since they comprise 62% of reported incidents, the totals can add up quickly to as much as $4.58 million annually. Although unintentional, errors like these can seriously damage a company’s reputation and result in severe regulatory penalties. Criminal or malicious insiders committing acts of theft, sabotage, or espionage. Although they attract the most notoriety, criminal and malicious insiders accounted for only 23% of insider attacks cited in the survey. However, given the $755,760 average cost of each such attack, the sum can reach $4.08 million annually. Insiders like these may be motivated by financial distress or political/ religious ideology, may be seeking revenge for perceived wrongs or work conflicts, or may have been swayed by inducements from cyber-criminal and state-sponsored threat groups. In its report, Ponemon attributes these costs to “monitoring and surveillance, investigation, escalation, incident response, containment, ex-post analysis and remediation.” Notably, the costs for investigation are growing fastest, rising 86% in only two years to average $103,798.Repeated attempts to evade security controls
Flagrant violations of acceptable use policies Hostile outbursts aimed at colleagues and supervisors Frequently logging into company databases outside of normal work hours Emailing large quantities of data to external entities Accessing sensitive data that is not pertinent to the worker’s role and responsibilities
Find out more about BlackBerry and the BlackBerry Cylance MSSP Partners Program. Read more BlackBerry Cylance blogs here. Regularly contributed guest blogs are part of MSSP Alert’s sponsorship program.