What’s the most important integration into every system that we service and/or install?
Every single system must integrate with people in some way. Every integration point opens up a new opportunity for a threat.
This post from Security Magazine really raised my awareness about the nature of insider threats and approaches to mitigating risk. What is an insider threat? It is any act of theft, fraud, sabotage or violence instigated by someone inside an organization. The post outlines several types of insider threats and some tips on how to recognize each:
Unintentional insider threat. This threat isn’t caused by someone acting maliciously; this type of threat is tipped off by someone who is distracted or stressed. They forget or shortcut important steps. To guard against this type of threat, be aware of staff members who are careless with sensitive information, overshare on social media and consistently miss deadlines.
Intellectual property/sensitive data theft. Do you have an associate that “borrows” office materials for home use? Has gotten a poor performance review, missed a promotion or is about to be fired? They may be a risk to steal intellectual property or sensitive data for their own benefit on their way out the door. That sensitive information could end up being used against you by a competitor or other threat.
Insider fraud. Keep an eye out for associates who routinely live beyond their means or are suddenly facing unexpected expenses. They could be at risk of perpetrating insider fraud to benefit themselves and get out of a tight spot.
Sabotage. The office bully isn’t just bad for morale. Bullying is a red flag for sabotage. The saboteur wants to disrupt or even destroy work in an effort to assert their dominance or get revenge for a slight.
Workplace violence. I see the threat of workplace violence as a progression of sabotage. The perpetrator of workplace violence wants to go beyond damaging a piece of equipment or undermining a sale. They want to cause physical harm to those around them, perhaps in an outburst. They share characteristics with saboteurs, but may also threaten violence.
Each of the above threats can be detected and mitigated with team effort. We’d be happy to talk to you about how systems can be integrated to help you detect these threats and others. Give us a call at (800) 567-1180 to consult.