facebook linkedin twitter

Computerware Blog

Employees Can Be Your Business’ Best Defense Policy

Employees Can Be Your Business’ Best Defense Policy

A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its greatest advantages if trained properly. To demonstrate this, let’s consider a few examples that exemplify either case.

Tesla’s Recent Near-Incident

In late August, a Russian national was arrested and charged with conspiracy to intentionally cause damage to a protected computer for attempting to recruit an employee of Tesla to install malware on the network of the Nevada company’s Gigafactory, as confirmed by owner Elon Musk via Twitter.

According to court documents, it was in mid-July that this hacker—27-year-old Egor Igorevich Kriuchkov—established contact with a Tesla employee whom he had briefly met in 2016. Using the popular messaging application WhatsApp, Kriuchkov set up an in-person meeting with the unnamed employee. By August 3, Kriuchkov tried to recruit this employee to assist him in stealing data from Tesla and extorting money in exchange for keeping this data private.

The attack would work like this: by simulating a Distributed Denial of Service (DDoS) attack, the group that Kriuchkov was working with could then steal Tesla’s data unnoticed. Then, the group would reach out and demand that Tesla pay them money to keep this data private.

After a few days, Kriuchkov requested another meeting with the employee to iron out the details. However, the employee had already made contact with the FBI to inform them, and as the FBI surveilled the meeting, the employee was able to get Kriuchkov to repeat his plan, listing other companies who the group had worked against and assuring the employee that their past conspirators were still employed by their companies. The employee was even told that another coworker could be made to look responsible if there were someone that this employee had a grudge against.

Ultimately, enough evidence was collected to arrest Kriuchkov, and he could now face up to five years in prison.

So, it was because of the employee’s efforts that Tesla was able to dodge a significant bullet here.

What Other Companies Have Experienced, and What it Shows

While Tesla was able to sidestep this threat due to the diligence and honesty of their employee, many companies have not been nearly so lucky. According to the Ponemon Institute, insider threats (such as the one that Kriuchkov and his co-conspirators were encouraging) have risen in frequency by 47 percent over the past two years, with the average incident increasing in cost by 31 percent.

Therefore, the importance of minimizing these incidents in your own business is clear. To do so, you need to ensure that your employees are on your side and are prepared to protect your business.

How to Minimize Insider Threats

The name of the game is going to be education. Not only will you need to make sure your employees are motivated to protect your business, they will need to know how to do so. For starters, we recommend that you do a few things:

  • Involve security in your company culture. Whatever impact a cybercrime has on your business, it will also have on your employees by association. By making this clear and giving everyone ownership of the company’s cybersecurity, you are unifying your team and putting everyone on the same side.
  • Keep your team up to date on trending attacks and acceptable behaviors. Like so many things in the business landscape, cybercrime is always shifting. If you and your team are going to be able to resist attempts of all kinds, everyone’s knowledge will have to be kept current. It also helps to establish acceptable use policies to minimize your vulnerabilities, so if you choose to do so, make sure they are properly adhered to.
  • Train your team to recognize, and respond to, cyberattacks appropriately. When your team does encounter a cyberattack of any kind, they need to know how they are to proceed. Establishing these procedures and developing plans to deal with these circumstances is an important step for you to take.

Whether you need assistance in securing your infrastructure with the proper protective solutions, training your team in more secure behaviors, or both, you can turn to Computerware for assistance. To learn more about how we can make it more likely that you’ll have an outcome closer to Tesla’s than to so many others’, give us a call at (703) 821-8200.

Tip of the Week: Keeping a Smartphone Cool
Which is a Better Spreadsheet Option, Google Sheet...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 20, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Business Management Hackers Hardware Microsoft Workplace Tips Network Security Backup Productivity Hosted Solutions Business Managed Service Provider Email Productivity Malware IT Services Saving Money Efficiency Google Innovation Computer Small Business User Tips Collaboration VoIP Quick Tips IT Support IT Support Data Backup Network Smartphones communications Mobile Devices Business Continuity Gadgets Disaster Recovery Data Recovery Microsoft Office Android Cybersecurity Social Media Smartphone Upgrade Mobile Office Server Communication Phishing Virtualization Miscellaneous Mobile Device Management Ransomware Holiday Operating System Users Windows Vendor Management Mobile Device Passwords Windows 10 Tech Term Managed IT Services Apps Outsourced IT Internet of Things Facebook Remote Monitoring BDR Unified Threat Management BYOD Automation Data Management Mobile Computing Managed IT services Remote Computing Apple Analytics WiFi Windows 10 Training Marketing Artificial Intelligence History Cloud Computing The Internet of Things Browser Business Technology Firewall Save Money Help Desk Alert Big data Encryption App Spam Health Office Bandwidth Covid-19 Office 365 Budget Managed Service Two-factor Authentication Information Technology IT Consultant Bring Your Own Device Windows 7 Antivirus Managed IT Maintenance Printer Content Filtering Gmail Hard Drives Going Green Government Cybercrime Access Control VPN Outlook Windows 8 Remote Work Healthcare Wireless Technology Cost Management Search Blockchain Tech Support Virus Networking Hiring/Firing Best Practice Lithium-ion Battery Recovery Wi-Fi Computers Employer-Employee Relationship Saving Time Information Retail Travel Education Data Security Hacking It Management Update Humor Data Loss Conferencing iPhone Customer Service Money Document Management Project Management Phone System IBM Augmented Reality Computing Intranet Twitter Value Law Enforcement Password Administration Hacker Compliance Solid State Drive File Sharing Data storage Risk Management Patch Management Applications Hard Drive Flexibility Avoiding Downtime Vendor Save Time Laptop Mobility Downtime Data Breach Legal Wireless Regulations Running Cable Current Events Storage Website Proactive IT Computer Repair Customer Relationship Management Voice over Internet Protocol SaaS PowerPoint Vulnerabilities Robot Telephone Systems Securty Fax Server Cortana Employee/Employer Relationship Cooperation Black Market Net Neutrality Cryptocurrency Chrome Google Maps Business Intelligence Scam User Digital Payment Virtual Desktop Router Social Engineering Business Growth Social Digital Comparison Tablet Monitoring Company Culture Meetings DDoS Websites Excel Paperless Office Private Cloud Sports Social Networking Management Telephony Disaster Software as a Service Hosted Solution Machine Learning End of Support Word eWaste Managed Services Provider Vulnerability Distributed Denial of Service Lifestyle Text Messaging Bitcoin IT service Webcam Streaming Media Data Protection How To Public Cloud Licensing Managed Services Downloads Processors Managed IT Service Identity Theft Bluetooth Notifications USB Presentation Inbound Marketing Distribution Politics Google Docs Processor Virtual Reality Redundancy Memory Experience Emails Specifications Safety Automobile Chromebook Cleaning Pain Points Computer Accessories Evernote Monitors Smart Devices Cost Solutions Office Tips Documents Computing Infrastructure Hack Virtual Assistant Teamwork Heating/Cooling Video Conferencing Professional Services Entertainment Trending Employees How To Start Menu Download Tech Terms Mouse YouTube Integration User Error Mobile Technology Co-managed IT Unified Communications Settings Programming Statistics Multi-factor Authentication Network Congestion Telephone Uninterrupted Power Supply Microchip Taxes Gaming Console Harddrive Public Speaking Remote Working Network Management Electronic Medical Records Transportation Spyware Reading Mobile Payment Samsung Debate Equifax Fleet Tracking Term Permissions Language Shortcut Recording Electricity Optimization Printing Employer Employee Relationship GPS Supply Chains Device security MSP Directions Display G Suite Nanotechnology Analytic Social Network SSID Hacks Physical Security Music Troubleshooting Financial Data Recycling Desktop Finance Dark Web Free Resource switches Writing External Harddrive Entrepreneur Electronic Health Records HIPAA Business Cards Service Level Agreement Health IT cache Relocation Best Practives Television Tablets Upgrades Environment Memes Startup Product Reviews Asset Tracking Processing Banking Botnet Competition Managing IT Services Unified Threat Management Backup and Disaster Recovery Read Logistics WannaCry Virtual Machines 3D Ebay Electronic Payment Username Wasting Time Sync LiFi Thin CLient Surveillance Screen Reader Customer Resource management Corporate Profile Cyber security CCTV Microserver Business Owner Telework Gamification Bookmark Time Management Freedom of Information Smart Phones Computer Malfunction Work/Life Balance IP Address Remote Workers Device Management Piracy Upload Employer/Employee Relationships Assessment Reliable Computing SharePoint Deep Learning IT Smart Tech Google Play Business Metrics Telephone Service Application Virtual Private Network Fiber-Optic Content Management Database Microsoft 365 Get More Done Google Calendar Adminstration Pirating Information Human Resources HTML Business Managemenet Managing Costs In Internet of Things Tip of the week Visible Light Communication Leadership Development Telephone System Medical IT VoIP Trend Micro Turn Key FinTech Mobile Security Browsers Touchscreen Printer Server News IT consulting Threats Knowledge Motion Sickness Data Storage Software License online Currency Trends User Tip Proactive Maintenance Consultation Scalability Trojan Multi-Factor Security Security Cameras Digital Signature Procurement Fraud Tactics Messenger Technology Tips CIO Tracking Devices Navigation Virtual Machine Organize Advertising Flash Rental Service eCommerce Audit Staffing Google Wallet Organization UTM LinkedIn Content Data Analysis Fake News Windows XP Error GDPR Managing Risk Web Server Society Upselling PCI DSS IT Plan Enterprise Resource Planning Printers SQL Server Data Warehousing Cabling Displays Communitications Legislation Supply Chain Management email scam Archive Addiction Access Books Workers Micrsooft Video Surveillance PDF Accountants Skype A.I. Tech Hypervisor Emergency Administrator Hard Drive Disposal Best Available Keyboard Internet Service Provider Holidays Computer Care Supercomputer Drones AI Fileless Malware Hybrid Cloud Webinar Microsoft Excel Saving ZTime Point of Contact Wireless Headphones Modem Strategy Domains Regulations Compliance Migration Connected Devices Proxy Server Azure Google Drive Windows Server 2008 Worker IT Assessment Personal Information CrashOverride Managing Stress Financial 3D Printing Regulation Capital Productuvuty