Log in
Show password
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Dynamic quotes 


SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector news

Proofpoint : What the Biggest and Boldest Insider Threat Incidents Can Teach Us

09/02/2021 | 05:32am EST

Most organizations spend significant time and resources on education around external threats and implementing solutions to mitigate them effectively. But it's rare to see this type of investment around learning about internal threats. This leads to a lack of knowledge and understanding around insider threats-what they look like, the risks and consequences of these threats, and how to combat them.

First, it's important to note that not all insider threats are malicious. In fact, 62% of insider threats are the result of negligent insiders. Negligent insiders are often well-meaning people who accidentally leak confidential or sensitive data.

Another type of insider threat is a compromised user who may unknowingly fall victim to credential compromise or malware that infects and takes control of their devices. Compromised insiders are typically responsible for 14% of insider threat incidents, which can cost an organization $871,000 per incident, on average.

It's worth noting that compromised users are not always unknowing victims. In fact, in a recently detected campaign, cyber criminals were emailing employees within their target organization to solicit their help in installing ransomware.

Though not all insider threats are the same, the risks and outcomes are frequently rooted in brand damage and financial loss.

We reviewed some of the biggest and boldest insider threats over the past two years to determine where greater education about insider threat risks could have played a valuable role. After all, the more your organization understands insider threats and the consequences associated with them, the better you can defend against them.

Here is a look at five of the insider threat incidents we identified that offer some great lessons.

Fraudulent invoices at ConocoPhillips

What happened: A ConocoPhillips employee created fraudulent invoices to trick the oil company into paying a friend's business more than $3 million. But this was just the start; these actions were part of a larger embezzlement scheme that totaled nearly $7.3 million.

Lesson learned: A robust insider threat management (ITM) platform can help detect and prevent supply chain risks by recognizing fraudulent invoices and requests before it's too late.

Customer record exposure at Microsoft

What happened: Microsoft stored customer information on unsecured servers, which led to the exposure of 250 million customer records over 14 years.

Lesson learned: Whether intentional or negligent, data loss can create significant problems for any organization, ranging from financial loss to reputation and brand damage. In this case, security and privacy practices were called into question for not only Microsoft but other large organizations, as well.

Unauthorized access in Ellsworth County

What happened: A former employee at the Ellsworth County Rural Water District No. 1 in Kansas remotely accessed the water district's computer system. He intentionally tampered with the disinfecting and cleaning process, risking the safety of the drinking water for the 1,500 retail customers and 10 wholesale customers across eight Kansas counties.

Lesson learned: Monitoring remote access to any network is an essential part of a robust cybersecurity plan to ensure that only authorized users can log in. Any unauthorized user should be flagged and prevented from accessing information before they have the chance to cause damage.

U.S. military leak nuclear weapons security protocols

What happened: U.S. military personnel trying to memorize the security protocols around nuclear weapons protections unknowingly leaked a significant amount of sensitive information by using an unencrypted flashcard learning app. The information was publicly visible for eight years.

Lesson learned: Even the most well-intentioned employee can inadvertently leak sensitive information, putting the business-or, in this case, national security-at risk. Every employee should be educated and regularly reminded about cybersecurity best practices to minimize the risk of an accidental insider incident.

Database exposure leads to a class-action lawsuit for Vertafore

What happened: Negligent employees at insurance software maker Vertafore exposed a Texas Department of Motor Vehicles database after storing files on an unsecured external storage service. The incident led to a class-action lawsuit.

Lesson learned: Training employees on proper cybersecurity processes and protocols is critical for any organization. In this case, the lack of training or guidance on how to store sensitive information correctly resulted in a class-action lawsuit after sensitive personal information was exposed.

The big takeaway: a robust ITM program is a must

The importance of understanding insider threats plays a major role in an organization's ability to detect, respond and prevent them effectively. As each of these five examples shows, it's not always a malicious insider who can cause brand damage or financial loss for an organization.

The reality is that even well-intentioned employees can make mistakes.

That's why it's critical for organizations to have a robust ITM program that allows them to monitor how data moves so they can prevent data loss. After all, data doesn't move by itself; people move data. And people are the greatest risk to any organization.

For more real-world examples of insider threats and additional valuable lessons learned, read the Proofpoint e-book, The Top 10 Biggest and Boldest Insider Threat Incidents of 2020-2021.


Proofpoint Inc. published this content on 02 September 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 02 September 2021 09:31:04 UTC.

ę Publicnow 2021
All news about PROOFPOINT, INC.
10/27Mimecast Considering Sale, Investment Among Strategic Options; Shares Rise 8% Late
10/18EXCLUSIVE : Email security software vendor Zix explores sale - sources
10/01PROOFPOINT : Named Best Overall Enterprise Email Security Solution Provider of the Year
09/14PROOFPOINT : How to Implement People-Centric DLP for Office 365
09/09PROOFPOINT : Countermeasures for Ransomware
09/08Proofpoint Announces Occurrence of Fundamental Change and Make-Whole Fundamental Change..
09/08ADVANCE FEE FRAUD : The Emergence of Elaborate Crypto Schemes
09/03PROOFPOINT : Why Building a Security Culture at Your Company Matters and How to Start
09/01PROOFPOINT, INC.(NASDAQGS : PFPT) dropped from S&P Software & Services Select Industry Ind..
09/01PROOFPOINT, INC.(NASDAQGS : PFPT) dropped from S&P Global BMI Index
More news
Analyst Recommendations on PROOFPOINT, INC.
More recommendations
Financials (USD)
Sales 2021 1 248 M - -
Net income 2021 - - -
Net Debt 2021 - - -
P/E ratio 2021 -
Yield 2021 -
Capitalization 10 160 M 10 160 M -
Capi. / Sales 2021 8,14x
Capi. / Sales 2022 6,92x
Nbr of Employees 3 658
Free-Float 96,0%
Duration : Period :
Proofpoint, Inc. Technical Analysis Chart | PFPT | US7434241037 | MarketScreener
Income Statement Evolution
Managers and Directors
Gary Leigh Steele Chairman & Chief Executive Officer
Paul R. Auvil Chief Financial & Accounting Officer
Marcel DePaolis Chief Technical Officer
Lyn Campbell SVP-Global Operations & Information Technology
Robert Darren Lee EVP, GM-Compliance & Digital Risk Business Unit
Sector and Competitors
1st jan.Capi. (M$)
PROOFPOINT, INC.28.95%10 160
ACCENTURE PLC37.87%228 288
SNOWFLAKE INC.10.52%103 844