Close Menu
Pet Business World
  • Trade News
    • Distributors
    • International
    • Legislation
    • Manufacturers
    • Other trades
    • Retailers
  • New Products
    • Birds
    • Cats
    • Dogs
    • Small Animals
  • Features
    • Industry Experts
    • Retailer profiles
  • Aquatics
  • Columnists
    • Newshound
    • Reptile Trade Views
  • People
  • Magazines
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
  • Classifieds
  • Trade Directory
  • Advertise
  • Email Newsletters
  • Subscribe
Facebook X (Twitter)
  • FREE Email Newsletters
  • About Us
  • Advertise
  • Contact Us
  • Free Magazine Subscriptions
X (Twitter) Facebook
Pet Business World
  • Trade News
    • Distributors
    • International
    • Legislation
    • Manufacturers
    • Other trades
    • Retailers
  • New Products
    • Birds
    • Cats
    • Dogs
    • Small Animals
  • Features
    • Industry Experts
    • Retailer profiles
  • Aquatics
  • Columnists
    • Newshound
    • Reptile Trade Views
  • People
  • Magazines
    1. May 2025
    2. April 2025
    3. March 2025
    4. February 2025
    5. January 2025
    6. December 2024
    Featured

    PBW News – May 2025

    By David ReesMay 13, 2025
    Recent

    PBW News – May 2025

    May 13, 2025

    PBW News – April 2025

    April 24, 2025

    PBW News – March 2025

    March 11, 2025
  • Classifieds
  • Trade Directory
Pet Business World
Trade News

Cyber attacks – what if it’s an inside job?

Rachel WoodBy Rachel WoodJanuary 24, 20195 Mins Read
Facebook Twitter LinkedIn Email
Share
Facebook Twitter LinkedIn Email

width="380"

Cyber attacks are on the increase, but how do you deal with a threat when it comes from within your own company? Cyber security training experts at Cucial Academy, who help re-train people who have left the military, offer some tips.

An inside job brings up images of bank raids and heists but in the modern world companies should be thinking just as seriously about the cyber threat coming from within their own business.

The possibility that a breach could be down to an employee or former employee is growing all the time.

It could be a malicious attack from a disgruntled member of staff who has recently been sacked or who has a grudge against the business, for instance.

But more often the threat comes from the unintentional actions of untrained employees that put the business at risk and create cyber vulnerability.

It is well known that a high percentage of data breaches are down to human error or lack of awareness – and cyber predators are ready to take advantage.

Here are seven key tips to preventing an inside job – and dealing with it efficiently if the worst happens:

1) Start with the basics – train your staff to spot a phishing email. Phishing is a simple scam that is easy to avoid with the correct training. However, approximately 94% of malware enters a network this way. Phishing emails are becoming more sophisticated, deliberately targeting staff with messages that appear to be addressed to them individually from clients or suppliers. Many include attachments that mimic anything from invoices to tax documents. Conducting fun, interesting and easy-to-implement staff training on a regular basis is key.

2) Ensure former employees do not have access to files and systems. A fired employee can be a significant insider threat if they are able to access files and systems. A removing access policy and/or an employee termination policy should be in place in advance. When an employee leaves the business, all access should be quickly removed. Not just to the building but to devices and software.

3) Utilise Principle of Least Privilege (PoLP) to limit access to the essentials, especially for short-term staff. When workers stay in post for only a matter of weeks or months a PoLP policy is an essential.

This system sees a new arrival start with no privileges and receive access only to systems and files they need to do their job. It may seem a simple principle, but it takes planning because many security systems assign rights in groups rather than to individuals. Businesses should map all job functions and what privileges they need – and avoid assigning privileges to guests, members of the public or those who do not need them.

4) Have a plan in place to deal with an insider incident. Companies need to be able to initiate security controls as soon as they suspect an employee or employees may be a threat to the business. This can involve invoking or honing monitoring tools to begin to gather evidence and determining the threat and scale of the incident.

Co-ordination with legal counsel can be initiated early to address privacy, data protection and legal responses. Suspected employees could have their accounts frozen or they could be placed on forced leave or job rotation to allow for a forensic investigation to take place.

5) Be aware of what lack of preparation means. For those organisations without the appropriate controls in place, the scenario may play out very differently.

It can result in increased damage to the business in terms of data stolen and reputation lost. Falsely-accused employees may take legal action against a business, whilst distrust of the organisation may arise amongst other employees.

GDPR is also an important issue to consider in advance. The regulation threatens fines of up to 20 million Euros or 4 per cent of annual global turnover for businesses which suffer data breaches. It also sets out a strict time frame for the reporting of breaches – normally within 72 hours. So, it is not only vital for businesses to be GDPR compliant but also to have clear and tested procedures in place for when things do go wrong.

6) Use advance checks to reduce risk during recruitment
Thorough background and reference checks in advance of employment are some of the best methods employers can use to reduce insider threat. Always take up references.

7) Consider the pros and cons of hiring external consultants to investigate internal threats. The advantage of hiring external consultants to help detect malicious employee behaviour is that they hold no loyalties or bias and cannot be influenced by people within the business.

They can also have knowledge and expertise that may not be present within the business and be able to see gaps in the business’s current cyber security policies that current staff are not aware of. The downside is that, if the external consultants are not supported at the highest levels within the business, they can become hamstrung with internal politics.

Without the authority to interview employees across the business and delve into its inner workings, they can be impeded by individuals who may not want them to advise new security controls (especially if they cause jobs losses or a restriction on current working practices).

 

 

Share. Facebook Twitter LinkedIn Email
Previous ArticleDog boarders form new organisation
Next Article Bird feeding throws winter lifeline
Rachel Wood

Rachel Wood, graphic designer. More than 40 years ago, I was one of the first females to be offered an apprenticeship within the printing industry. I've worked on record sleeves, DVD covers and various magazines throughout my career. In my spare time I collect movie posters and attend comic cons, I keep fit (and sane) with gardening and strength & conditioning training.

Read Similar Stories

Legislation

Ban on pets in rented homes set to end

June 16, 2022
Trade News

Owners prioritising pets over restaurant visits

June 14, 2022
Dogs

Dog treats for Ukraine

May 19, 2022
Most Read

Pedigree Wholesale cuts prices on 500 products

May 19, 2025

Omni builds novel protein wet food range

May 19, 2025

Finalists announced for PIF Innovation Award

May 16, 2025
© 2024 Lewis Business Media. All Rights Reserved.
Lewis Business Media, Suite A, Arun House, Office Village, River Way, Uckfield, TN22 1SL

Privacy Policy | Cookie Policy | Terms & Conditions

  • OvertheCounter
  • Pest Magazine

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “ACCEPT ALL”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsREJECT ALLAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
AWSALBCORS7 daysThis cookie is managed by Amazon Web Services and is used for load balancing.
cookielawinfo-checkbox-necessary1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Necessary" category .
PHPSESSIDsessionThis cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
AWSALB7 daysAWSALB is a cookie generated by the Application load balancer in the Amazon Web Services. It works slightly different from AWSELB.
explat_test_aa_weekly_lohp_2021_week_4517 days 8 hoursNo description
ppwp_wp_session30 minutesNo description
tk_ai14 daysGathers information for WordPress by themselves, first party analytics tool about how WP services are used. A collection of internal metrics for user activity, used to improve user experience.
tk_qssessionGathers information for WordPress by themselves, first party analytics tool about how WP services are used. A collection of internal metrics for user activity, used to improve user experience.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
OAGEOsessionOpenX sets this cookie to avoid the repeated display of the same ad.
OAID1 yearThis cookie is set when an AdsWizz website visitor have opted out the collection of information by AdsWizz service or opted to disable the targeted ads by AdsWizz.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gat_gtag_UA_31822138_71 minuteSet by Google to distinguish users.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
tk_lr1 yearThe tk_lr is a referral cookie set by the JetPack plugin on sites using WooCommerce, which analyzes referrer behaviour for Jetpack.
tk_or5 yearsThe tk_or is a referral cookie set by the JetPack plugin on sites using WooCommerce, which analyzes referrer behaviour for Jetpack.
tk_r3d3 daysJetPack installs this cookie to collect internal metrics for user activity and in turn improve user experience.
SAVE & ACCEPT
Powered by CookieYes Logo