Insider Threat

Insider threat refers to individuals with privileged access to sensitive areas and/or information who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security or facilitate criminal activity, terrorism, or other illicit actions that inflict harm to people, an organization, the air transportation system or national security.


Four Insider Threats Putting Every Company At Risk

Published by Forbes 6 October 2021

"Few concerns keep business leaders up at night like the threat of a cybersecurity incident. With the average cost of a data breach exceeding $4 million for the first time and public sentiment, regulatory requirements and practical functionality firmly against companies that can’t protect their digital landscape, many leaders are reprioritizing cybersecurity in response to this increasingly urgent reality. 

"According to Gartner’s 2021 CIO Agenda Survey, cybersecurity is the top spending priority for 61% of leaders as they work to address rapidly shifting risks and responsibilities." 

To read this article, click here.



Cyber improvements could lead to more insider targeting, intel official says

Published by Federal News Network 5 October 2021

"As federal agencies and U.S. industry bolster their cybersecurity defenses, foreign intelligence agencies are likely to ramp up their targeting of trusted insiders, according to the director of the National Insider Threat Task Force.

"Bob Rohrer, who has led the task force since January, said the successful implementation of zero trust architectures and other least-privilege principles could make it harder for foreign spies to pilfer U.S. secrets by exploiting gaps in network defenses. President Joe Biden has directed agencies to adopt zero trust architectures as part of his May cyber executive order."

To read this article, click here.



How User Access Reviews Manage Insider Threats

Published by Security Boulevard 15 September 2021

"The threat isn’t always coming from outside an organization. In any organization, big or small, employees are given access to critical information, files, data, and more. It may seem like employees, or internal users, would be the obvious people to trust with these kinds of assets. The organization hired them, HR probably conducted a background check, and for many, accessing certain assets is a requirement of the job. But, when it comes to cybersecurity, the motto remainstrust no one."

To read this article, click here.



National Insider Threat Awareness Month Focuses on Workplace Culture

Published by Homeland Security Today 3 September 2021

"The NITAM campaign seeks to encourage employees in government and the private sector to recognize behaviors of concern and report them so early intervention can occur.

"The National Counterintelligence and Security Center (NCSC), the National Insider Threat Task Force (NITTF), the Office of the Under Secretary of Defense Intelligence and Security, the Defense Counterintelligence and Security Agency, and the Department of Homeland Security launched the third-annual “National Insider Threat Awareness Month” (NITAM)."


To read this article, click here.



25 Tips for Preventing, Detecting, and Responding to Today’s Insider Threat

Published by Loss Prevention Magazine 1 September 2021

"The insider threat has evolved beyond the reach of employee bag checks and point-of-sale cameras. For all organizations, retailers included, the threat surface that employees can attack has grown, and so have the types of assets that they can exploit, misuse, or mistakenly expose. Never has so much of value been this accessible to a company’s workforce. Never have companies been so vulnerable to their dishonesty, mistakes, or retribution."

To read this article, click here.



Navigating Old and New Threats as Employees Return to Office Post-Pandemic

Published by Homeland Security Today 6 July 2021
Company executives face several challenges in moving employees from remote work back to the office environment. Before making the shift, it is a good idea to sit down and consider the potential threats that could arise and how to mitigate the risks. 
To read this article, click here

Off-duty flight attendant identified as 'unruly passenger' who forced Delta flight to divert

Published by USA Today 12 June 2021
In the past year, the number of incidents involving misbehaving passengers and flight attendants has risen substantially. In a recent case, the passenger turned out to be an off-duty flight attendant for the airline. 
To read this article, click here

Airport worker arrested and charged with drug trafficking and money laundering

Published by The Sydney Morning Herald 11 June 2021
Organized criminal groups are actively infiltrating its members into airports and aviation companies as employees, according to the Australian Federal Police (AFP). Hundreds of organized crime figures were recently arrested as a result of the AFP's latest operation. 
To read this article, click here

Minimizing threats from employees as they return to work

Published by Intelligent CIO 25 May 2021
In the past year, many companies moved their employees to a remote working status in response to the COVID-19 pandemic. Now, as they make plans to bring these employees back into the office, compromised devices is a big concern. 
To read this article, click here

Defense Department Linguist Pleads Guilty to Transmitting Highly Sensitive Classified National Defense Information to Aid a Foreign Government

Published by United States Department of Justice 26 March 2021
There is always a level of risk involved when a person is provided access to sensitive and top secret information. If that person betrays the trust they are given, the lives of others can be put at risk. One woman is facing a prison term of up to life for her role in providing top-secret files to a terrorist organization. 
To read this press release, click here.

FAA Employee Charged After Self-described “Treason and Espionage”

Published by Plane&Pilot 4 March 2021
Employees who become insider threats are motivated by a number of factors, making it challenging for companies and agencies alike to identify them before they act. In this case, an FAA employee was seeking asylum and over $25 million from three different countries in exchange for sensitive information.
To read this article, click here

A Look at Evolving In-Transit Risks and Controls They Demand

Published by Loss Prevention Magazine 7 January 2021
Do you know how to mitigate supply chain theft? How thoroughly do you check the backgrounds of those you hire? Experts predict that this issue will continue to affect retailers, consumers and cargo transport operations in 2021.
To read this article, click here.

Insider Threat Resources

Published by Cybersecurity & Infrastructure Security Agency November 2020
Avoid falling victim to Insider Threats. Check out these multiple resources provided by the Cybersecurity & Infrastructure Security Agency (CISA):
To view these resources, click here.

Supervisor Noticed Odd Behaviour

Published by Otago Daily Times 7 November 2020
Disgruntled employees can pose a huge threat to any organization. A current case in New Zealand is examining whether an employee is responsible for an imitation bomb that was planted at an airport. According to Otago Daily Times, “The Crown case is that Maid planted them [a note and a black bag with fake explosive items within] there during his patrol, specifically to draw attention to problems he perceived over lax security at the airport.”
To read this article, click here. 

TSA Officers Catch Contract Employee With Loaded Gun

Published by Homeland Security Today 31 October 2020
Insider threat doesn’t just involve employees, it can involve contractors as well. Recently, a loaded gun was confiscated from a contract employee. The firearm was discovered when the man was flagged for additional screening during a random inspection by TSA officers.
To read this article, click here

Data-Driven Resilience: How Agencies Can Protect Against Insider Threats

Published by Homeland Security Today 9 October 2020
During a two-year period, including 2020, there was a 47% increase in breaches caused by insider threat. In addition to this risk, agencies must also watch out for risks generated by the increasing number of employees working from home.
To learn more, click here. 

Is Your Agency’s Insider Threat Strategy Missing This Major Element?

Published by Homeland Security Today 29 September 2020
National Insider Threat Awareness Month (NITAM) may be coming to an end, but you can still take proactive steps in mitigating your operation’s risk. Insider threat can cause more damage than you think. Ensure your operation’s insider threat strategy isn’t lacking important factors.
To read this article, click here

Top 10 Tips to Prevent Insider Threats

Published by Security Boulevard 9 September 2020
Are you aware of the possible threats that could occur within your organization? Do you have a plan in place to prevent these threats? If not, take a moment to look over these top 10 tips to help mitigate insider threat. Just because something hasn’t happened yet, doesn’t mean it can’t happen eventually.
To read these tips, click here

Mapping the Motives of Insider Threats

Published by Help Net Security 8 September 2020
What are some of the motivators that lead insiders to commit a crime? What if there is no motive, and it was simply human error? Considering its National Insider Threat Awareness Month, it’s a great opportunity to educate yourself on this topic to help mitigate possible threats to your organization.
For more information on these motives, click here



Six Industry Experts on Spotting, Stopping and Preventing Insider Threats

Published by Homeland Security Today 1 September 2020
Insider threat is a serious issue that can be harmful to any organization. Take a few moments to learn how to prevent insider threat by reading six different perspectives from leading cybersecurity and IT experts. Don’t forget its National Insider Awareness month!
To read this article, click here

Russian Arrested For Trying to Recruit an Insider and Hack a Nevada Company

Published by ZDNet 26 August 2020
A Nevada company’s employee, in partnership with the FBI, was able to prevent a Russian group from launching a planned ransomware attack. The FBI was brought in when the employee was approached by a member of the group in a recruiting attempt.
To read this article, click here

FBI Arrests Border Patrol Agent for Narcotics Trafficking

Published by Homeland Security Today 11 August 2020


Phoenix Sky Harbor International Airport was the scene of a recent alleged case of drug trafficking. A vehicle at the airport was found with two bags that were filled with fentanyl, cocaine and heroin. The bags were traced to a Border Patrol Agent, who is now facing up to life in prison and multiple charges.


To read this article, click here





Soft Skill Strategies for Handling Insider Threats Ethically

Published by Info Security Group 6 July 2020


Insider threat can be detrimental to your organization; that’s why it’s important to have a strategy in place. This article provides detailed information on different, proactive tactics to mitigate against possible threats. Info Security Group says, “While technical skills and knowledge are critical in the information security landscape, it is unquestionably important to remember that insider threats involve humans, hence, we cannot neglect the use of soft skills to manage incidents.”


To learn more, click here





Protecting From Insider Threats in The Transportation Sector

Published by Federal News Network 1 June 2020
Learn more about protecting against insider threat with Transportation Security Specialist, Dean Walter and Supervisory Air Marshal in Charge, Serge Potapov. They both join Tom Temin, via podcast, as they discuss insider threats in the transportation sector.
To listen to this podcast, click here

Insider Threat Roadmap 2020

Published by Transportation Security Administration
The Transportation Security Administration (TSA) has released a new Insider Threat Roadmap. The roadmap focuses on three overarching priorities:
1) promoting data-driven decision making to detect threats;
2) advancing operational capability to deter threats; and
3) maturing capabilities to mitigate threats to the transportation sector.


To view this roadmap, click here.



Insider Threat in Civil Aviation

Published by International Air Transport Association
The International Air Transport Association (IATA) provides an in-depth look into the impact insider threat has within the aviation industry. IATA gives a detailed description of insider threat and offers guidance to help operators mitigate possible risks. IATA also outlines the importance of having security measures in place to ensure proper visibility and awareness of the issue, with the purpose of putting a stop to it as soon as possible.
To read this article, click here. 

Department of Homeland Security - Insider Threat Overview

Published by Department of Homeland Security
It's important to educate yourself on the topic 'insider threat' so you can know what signs to look for and how to prevent the threat. The Department of Homeland Security (DHS) provides detailed information on their approach to help mitigate the risks and other helpful resources. DHS states, "Increasingly, insider threat cases and high-profile data leaks illustrate the need for strong insider threat programs within organizations. The number of infamous and damaging attacks against the government illustrates that the threat posed by trusted insiders is significant."
To read this overview, click here.

Innocent Insider Threats: Defending Against Human Error

Published by Intelligent CIO 21 April 2020

The topic of insider threat involves entities or individuals that have access to and/or knowledge of an organization that is not intended for the public eye. The most common type of insider threat stems from employee’s lack of knowledge, which would be detrimental to an organization. It could be as simple as human error or employee's not following company guidelines. It’s important your organization have programs in place to avoid falling victim to these threats.
To read this article, click here.

3 Tips to Stay Secure When You Lose an Employee

Published by Dark Reading 10 March 2020
Dorothy in ‘The Wizard of Oz,’ says it perfectly, “People come and go so quickly…” This still rings true today with regards to company turnover rates. Some employees stay with a company for years, some only a few weeks. Whatever the case - when a company and employee go their separate ways, it is important to have proper precautions in place to mitigate possible threats. This article spotlights three tips on how to remain secure when ending a business relationship.
To learn how to protect your operation, click here.

A Study of Insider Threat; What Can We Do to Alter User Behaviour and 
Mitigate the Risk of Insider Threats

Published by IS Decisions

The topic of ‘Insider Threat’ is something all business entities should be aware of. A recent study gives an in-depth look into this important subject and different ways to help reduce exposure. The study focuses on four critical areas of insider threat:

1. Six common insider threat personas
2. Password sharing
3. User awareness
4. How to mitigate risk

To read this study, click here.


Thai Soldier Dead After Killing at Least 29 in Shooting Rampage

Published by NBC News 9 February 2020

A dispute over money instigated a Thai soldier to open fire on others, wounding 27 and killing 29, according to the country’s prime minister. The shooting originated on a military base and then expanded to other parts of Nakhon Ratchasima where the gunman engaged in a 10-hour standoff with police at a nearby mall.

To read this article, click here.



Indictment: Ex-Raytheon Engineer in Tucson Traveled to China With Missile Data on Laptop

Published by Tuscon Daily Star 5 February 2020

After he was specifically instructed not to take his employer-owned laptop with him to Asia, an ex-Raytheon engineer did just that. The laptop, which held sensitive data on the company’s missile systems, was used in Hong Kong, Cambodia and China. Now, he faces an indictment for violating the International Traffic in Arms Regulation (ITAR).

To read this article, click here.



'Careful Who You Hire': Gas Station Employee Steals $17,000 Worth of Items, Employment Folder

Published by KSBW 8 News 4 February 2020

A brand-new gas station employee took over $17,000 in items and his employment folder. The store owner, who does not know the man’s name, discovered the theft after checking his store’s camera through an application on his cellphone and seeing the employee was gone.

To read this story, click here.



Containing the Threat From Within: The Growing Risk of Insider Attacks

Published by Forbes 31 January 2020

Large companies like Capital One and Tesla have recently become victims of insider attacks, highlighting the need for companies to take notice of models like zero trust.

To read this article, click here.



'Pressured' Postal Worker in Virginia Hid Undelivered Mail in Storage Unit: Reports

Published by Fox News 30 January 2020

Citing pressure and not having enough time, a worker with the United States Postal Service kept mail in a storage facility in Virginia Beach, Virginia, instead of delivering it. The undelivered mail included tax return documents, mail from the Department of Motor Vehicles, mail from the IRS and bank statements.

To read this article, click here.



Fake Exec Tricks New York City Medical Center into Sharing Patient Info

Published by infosececurity magazine 30 January 2020

A medical center in New York City is re-examining its cybersecurity defenses after it fell victim to a phishing scam. After claiming to be an executive of the facility, an unauthorized actor received personal information on 674 patients.

To read this article, click here.



Insider Threat Mitigation

Published by Department of Homeland Security

Does your company have an insider threat program? This set of tools from the Cybersecurity and Infrastructure Security Agency (CISA) shows you how to designate a senior manager, implement a formal training and awareness program, develop governance and policy documents, and more.

To view these tools, click here.



A Guide to Insider Threats

Posted by Meta Compliance 17 September 2019

Insider threats can come from anywhere within your organization. Learning the warning signs and preparing a defense can help you mitigate the risk to your company.

To learn more about insider threat, click here.



Is Your Company Safe From Insider Threat?

Posted by Claudia Culmone on 28 January 2019

First, what is an insider threat? According to the Transportation Security Administration’s (TSA) 2018 Report of the Aviation Security Advisory Committee on Insider Threats at Airports, “The term insider threat refers to individuals with privileged access to sensitive areas and/or information, who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security, facilitate criminal activity, terrorism, or other illicit actions which inflict harm to people, an organization, the air transportation system or national security.”

With that definition in mind, let’s examine the components of insider threat and how you can protect your operation from them.

To read this article, click here.