Site icon Business Manchester

Navigating the ‘Insider’ Cyber Security Threat

67043574 6b6e e3ae bd49 20c47e4acc6e

Firms today are increasingly challenged by cyber security threats originating from within. Though often overshadowed by high-profile external attacks, these internal dangers are alarmingly prevalent.

Research from Clearswift reveals a dramatic rise in employee-related incidents, urging companies to reconsider their internal security protocols. It is crucial to recognise that the familiar can often harbour the most severe risks.

Understanding ‘Insider’ Threats

The increasing concern for companies today is the rising number of cyber security threats stemming from within their own organisations. Research conducted by Clearswift highlights that these internal threats currently account for 42% of security incidents, a notable increase from 39% in 2015. This encompasses not just employees but extends to customers, suppliers, and even former employees. As external threats decline, the focus shifts towards these internal actors.

Delving Into the Statistics

The figures from Clearswift’s research are revealing; the number of incidents involving insiders has alarmingly increased to 74% when considering the extended enterprise, compared to 26% from unknown parties. In contrast, just two years ago, 33% of these threats were from unidentified sources. Despite well-publicised attacks such as WannaCry, which targeted over 230,000 computers globally, the internal threat remains significant. Businesses are now more vigilant, detecting suspicious activities more swiftly than before.
Moreover, a significant portion of the UK businesses, about 29%, have now tabled cyber security as a regular boardroom agenda, recognising the gravity of internal threats. This proactive stance is vital in combating potential breaches.

Interpreting the Impact of GDPR

The advent of GDPR has amplified the need for robust data security measures across all sectors. Each department, from finance to HR, must now keenly understand the security implications of their data handling practices. Dr Guy Bunker of Clearswift warns against the complacency surrounding external threats, pointing out that dangers often lie in familiar places. Data misuse, whether inadvertent or deliberate, could bring about severe penalties. Companies must therefore channel efforts into effective data protection strategies and encourage employees to act responsibly with organisational data.

Strategies for Mitigating Risks

It is evident that a blanket ban on technology is not a sustainable solution. Employees are adept at finding workarounds, which can often exacerbate security issues. Dr Bunker suggests that educating staff on securing critical information and motivating them to understand the consequences of data breaches are crucial steps forward. Additionally, investing in advanced Data Loss Prevention (DLP) tools can provide an added layer of security by monitoring and controlling the transfer of critical information.
Companies must also scrutinise the information-sharing protocols of their partners and suppliers closely. A breach within this extended enterprise can potentially incur substantial financial penalties for the business concerned.

The Role of Education in Cyber Security

Despite the acknowledged risks, many employers maintain that most internal security breaches are unintentional. This presumption necessitates a heightened emphasis on security education within businesses. With many businesses claiming that vital data resides in departments traditionally viewed as non-technical—such as finance, HR, and legal—it becomes imperative to uplift the security literacy of these teams. Training can effectively bridge the gap between awareness and action, minimising risks and bolstering the organisation’s overall security posture. Enhanced detection systems that enable quick identification of threats are now available. Indeed, over half of organisations report being able to detect potential breaches within an hour.

Evolving Security Practices

Cyber threats are continually evolving, and so too must the countermeasures organisations employ. A significant step involves building a culture of security where every employee understands their role in safeguarding data. Tailoring security measures to match the specific needs of various departments ensures that protective efforts are both concentrated and effective. As a part of this evolution, businesses must leverage the latest technologies and advance their security automation processes to remain a step ahead of potential threats.
Developing a comprehensive security policy that accommodates both existing and emerging threats offers a strategic advantage. Such policies must be revisited regularly to adapt to new challenges in the cyber landscape.

The Future of Cyber Security Management

To succeed in the battle against insider threats, organisations must integrate forward-thinking approaches into their security framework. Emphasising collaboration between departments can mitigate isolated errors and foster a unified defence strategy. Continuous monitoring and review processes should be instituted to maintain a dynamic defence against insider threats and adapt to evolving risks. The future lies in proactive threat detection rather than reactive measures, ensuring that organisations remain resilient in the ever-changing cyber environment.


In facing the intangible menace of insider threats, companies must adopt a proactive stance. Strengthening internal protocols and fostering a culture of awareness is not just prudent but essential.

Exit mobile version