Published by Transportation Security Administration
The Transportation Security Administration (TSA) has released a new Insider Threat Roadmap. The roadmap focuses on three overarching priorities:
1) promoting data-driven decision making to detect threats;
2) advancing operational capability to deter threats; and
3) maturing capabilities to mitigate threats to the transportation sector.
To view this roadmap, click here.
Insider Threat in Civil Aviation
Published by International Air Transport Association
The International Air Transport Association (IATA) provides an in-depth look into the impact insider threat has within the aviation industry. IATA gives a detailed description of insider threat and offers guidance to help operators mitigate possible risks. IATA also outlines the importance of having security measures in place to ensure proper visibility and awareness of the issue, with the purpose of putting a stop to it as soon as possible.
To read this article, click here.
Department of Homeland Security - Insider Threat Overview
Published by Department of Homeland Security
It's important to educate yourself on the topic 'insider threat' so you can know what signs to look for and how to prevent the threat. The Department of Homeland Security (DHS) provides detailed information on their approach to help mitigate the risks and other helpful resources. DHS states, "Increasingly, insider threat cases and high-profile data leaks illustrate the need for strong insider threat programs within organizations. The number of infamous and damaging attacks against the government illustrates that the threat posed by trusted insiders is significant."
To read this overview, click here.
Innocent Insider Threats: Defending Against Human Error
Published by Intelligent CIO 21 April 2020
The topic of insider threat involves entities or individuals that have access to and/or knowledge of an organization that is not intended for the public eye. The most common type of insider threat stems from employee’s lack of knowledge, which would be detrimental to an organization. It could be as simple as human error or employee's not following company guidelines. It’s important your organization have programs in place to avoid falling victim to these threats.
To read this article, click here.
3 Tips to Stay Secure When You Lose an Employee
Published by Dark Reading 10 March 2020
Dorothy in ‘The Wizard of Oz,’ says it perfectly, “People come and go so quickly…” This still rings true today with regards to company turnover rates. Some employees stay with a company for years, some only a few weeks. Whatever the case - when a company and employee go their separate ways, it is important to have proper precautions in place to mitigate possible threats. This article spotlights three tips on how to remain secure when ending a business relationship.
To learn how to protect your operation, click here.
A Study of Insider Threat; What Can We Do to Alter User Behaviour and
Mitigate the Risk of Insider Threats
Published by IS DecisionsThe topic of ‘Insider Threat’ is something all business entities should be aware of. A recent study gives an in-depth look into this important subject and different ways to help reduce exposure. The study focuses on four critical areas of insider threat:1. Six common insider threat personas2. Password sharing3. User awareness4. How to mitigate riskTo read this study, click here.
Thai Soldier Dead After Killing at Least 29 in Shooting Rampage
Published by NBC News 9 February 2020
A dispute over money instigated a Thai soldier to open fire on others, wounding 27 and killing 29, according to the country’s prime minister. The shooting originated on a military base and then expanded to other parts of Nakhon Ratchasima where the gunman engaged in a 10-hour standoff with police at a nearby mall.
To read this article, click here.
Indictment: Ex-Raytheon Engineer in Tucson Traveled to China With Missile Data on Laptop
Published by Tuscon Daily Star 5 February 2020
After he was specifically instructed not to take his employer-owned laptop with him to Asia, an ex-Raytheon engineer did just that. The laptop, which held sensitive data on the company’s missile systems, was used in Hong Kong, Cambodia and China. Now, he faces an indictment for violating the International Traffic in Arms Regulation (ITAR).
To read this article, click here.
'Careful Who You Hire': Gas Station Employee Steals $17,000 Worth of Items, Employment Folder
Published by KSBW 8 News 4 February 2020
A brand-new gas station employee took over $17,000 in items and his employment folder. The store owner, who does not know the man’s name, discovered the theft after checking his store’s camera through an application on his cellphone and seeing the employee was gone.
To read this story, click here.
Containing the Threat From Within: The Growing Risk of Insider Attacks
Published by Forbes 31 January 2020
Large companies like Capital One and Tesla have recently become victims of insider attacks, highlighting the need for companies to take notice of models like zero trust.
To read this article, click here.
'Pressured' Postal Worker in Virginia Hid Undelivered Mail in Storage Unit: Reports
Published by Fox News 30 January 2020
Citing pressure and not having enough time, a worker with the United States Postal Service kept mail in a storage facility in Virginia Beach, Virginia, instead of delivering it. The undelivered mail included tax return documents, mail from the Department of Motor Vehicles, mail from the IRS and bank statements.
To read this article, click here.
Fake Exec Tricks New York City Medical Center into Sharing Patient Info
Published by infosececurity magazine 30 January 2020
A medical center in New York City is re-examining its cybersecurity defenses after it fell victim to a phishing scam. After claiming to be an executive of the facility, an unauthorized actor received personal information on 674 patients.
To read this article, click here.
Insider Threat Mitigation
Published by Department of Homeland Security
Does your company have an insider threat program? This set of tools from the Cybersecurity and Infrastructure Security Agency (CISA) shows you how to designate a senior manager, implement a formal training and awareness program, develop governance and policy documents, and more.
To view these tools, click here.
A Guide to Insider Threats
Posted by Meta Compliance 17 September 2019
Insider threats can come from anywhere within your organization. Learning the warning signs and preparing a defense can help you mitigate the risk to your company.
To learn more about insider threat, click here.
Is Your Company Safe From Insider Threat?
Posted by Claudia Culmone on 28 January 2019
First, what is an insider threat? According to the Transportation Security Administration’s (TSA) 2018 Report of the Aviation Security Advisory Committee on Insider Threats at Airports, “The term insider threat refers to individuals with privileged access to sensitive areas and/or information, who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security, facilitate criminal activity, terrorism, or other illicit actions which inflict harm to people, an organization, the air transportation system or national security.”
With that definition in mind, let’s examine the components of insider threat and how you can protect your operation from them.
To read this article, click here.