The Most Common Ways You Could Get Tricked into Compromising Company Data

The Most Common Ways You Could Get Tricked into Compromising Company Data

While major breaches where millions of records are compromised tend to dominate the news, a much more dangerous and insidious threat goes largely unnoticed — that of the insider. An “accidental insider” is a well-meaning employee who is tricked by adversaries or competitors into revealing passwords or unintentionally installing malicious code onto organizational networks. The first most common way that employees get tricked is via phishing e-mails that seem like legitimate e-mails from colleagues. The second is the Trojan — a hidden bit of malicious code in an email attachment or link.  And the third most common way hackers gain access is the via employees’ personal devices. While these aren’t the only ways that adversaries can trick insiders into doing their bidding, they are the most likely to compromise your company. Leaders need to remember that adversaries are persistent and patient. They are willing to work hard, do their research, and target vulnerable employees and high-level executives alike. Understanding their methods and instilling vigilance in all employees is the best way to prevent an accidental insider from hurting your company.

While major breaches where millions of records are compromised tend to dominate the news, a much more dangerous and insidious threat goes largely unnoticed — that of the insider. An “accidental insider” is a well-meaning employee who is tricked by adversaries or competitors into revealing passwords or unintentionally installing malicious code onto organizational networks. Alternately, a malicious insider steals data for personal or financial gain with intent to harm the employer.

How prevalent is the insider threat problem? According to a study performed by Accenture and HFS Research, “2 out of 3 respondents reported experiencing data theft or corruption from within their organizations.” A study by the Ponemon Institute reveals that 62% percent of end users say they have access to company data they probably shouldn’t see.

This means that most employees have access to data they could unwittingly reveal if they’re duped by a clever adversary. Yet, there are some relatively easy ways to protect the organization from the tricks commonly used by the outsider to compromise the insider:

As an email travels from a client through a server to a recipient, there are potential network vulnerabilities all along its path. In fact, when you receive an email, the source address listed has little to do with who the message actually came from. That information can easily be spoofed, and your mail server does nothing to authenticate the origin of the email. Even though an email might look like it came from a trusted source, today’s adversaries are sophisticated social engineers and can easily fool anyone.

While many organizations employ spam filtering software, and we all know not to open emails from mysterious Nigerian generals, what if an email appears to come from a colleague or supervisor? This scenario was recently illustrated when a UK hacker fooled White House officials into revealing personal information.

Share it:
Share it:

[Social9_Share class=”s9-widget-wrapper”]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You Might Be Interested In

Why Does Successful AI Require The Right Data Architecture

16 Oct, 2022

Artificial Intelligence promises cost savings, a competitive edge, and a foothold into the future for the business. While AI adoption …

Read more

A Comprehensive Guide to Data Virtualization for Enterprises

18 Jul, 2022

Enterprises are aggressively investigating beyond the capabilities of traditional data integration such as Extract Transform Load (ETL) systems or data …

Read more

Digital transformation: 3 myths the pandemic busted

17 Oct, 2021

When the pandemic struck, most organizations had no choice but to accelerate their digital technology adoption. Many condensed into a …

Read more

Recent Jobs

Senior Cloud Engineer (AWS, Snowflake)

Remote (United States (Nationwide))

9 May, 2024

Read More

IT Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Data Engineer

Washington D.C., DC, USA

1 May, 2024

Read More

Applications Developer

Washington D.C., DC, USA

1 May, 2024

Read More

Do You Want to Share Your Story?

Bring your insights on Data, Visualization, Innovation or Business Agility to our community. Let them learn from your experience.

Get the 3 STEPS

To Drive Analytics Adoption
And manage change

3-steps-to-drive-analytics-adoption

Get Access to Event Discounts

Switch your 7wData account from Subscriber to Event Discount Member by clicking the button below and get access to event discounts. Learn & Grow together with us in a more profitable way!

Get Access to Event Discounts

Create a 7wData account and get access to event discounts. Learn & Grow together with us in a more profitable way!

Don't miss Out!

Stay in touch and receive in depth articles, guides, news & commentary of all things data.