Insider Psychology

Collaborate on cutting-edge hong kong data technologies and solutions.
Post Reply
relemedf5w023
Posts: 409
Joined: Sun Dec 22, 2024 7:16 am

Insider Psychology

Post by relemedf5w023 »

It also turned out that in attempts to leak corporate data, employees most often (in 56% of cases) used external media: flash drives, hard drives, mobile phones and other equipment. Then, by a large margin, come mail (21% of cases) and clouds (19%).

"To prevent employees from dumping data onto external media, the employer can impose a ban on copying data of a certain format. Or any documents from specific PCs. However, this runs the risk of slowing down some business processes, since then employees will not be able to perform some of their job responsibilities. Therefore, such a measure should be applied selectively. It is more effective to use a data encryption tool: the document will be copied onto an external media, but the user will be able to open it only on authorized PCs, or under other conditions (for example, the presence of a password). This will allow employees to exchange data with each other, but will prevent it from being taken outside the company," says Alexey Drozd.

This topic was raised in his speech by the scientific director of the profiling department at SearchInform, Alexey Filatov.


He particularly emphasized that, according to the denmark mobile database of Data Breach Report, under the influence of the self-isolation regime, the number of leaks has increased fivefold!

Alexey Filatov, referring to the research of Owner Consulting, noted that 10% of people never steal, 10% of people always steal, and 80% of people will steal under favorable conditions. In this case, the motives of the insider can be divided into five large groups: negligence, revenge or resentment, benefit, fraud, ideological considerations.

There are studies that claim that up to 40% of insiders and employees who commit serious violations of information security rules do not show themselves in any way before an incident in the network environment. At the same time, more than 80% of insiders have significant personal and behavioral characteristics, the identification and assessment of which makes it possible to calculate the risk of violation of information security rules by a specific employee. However, as Alexey Filatov notes, it is almost impossible to identify personality traits that are important for security professionals using tests and questionnaires, since employees give predominantly socially desirable answers when filling out these questionnaires.
Post Reply