Exabeam
flow-image

Insider Threats: When the Attacker Has Valid Credentials

Published by Exabeam

Insider threats are classified into three categories:

  1. Malicious Insider – an employee or contractor who knowingly looks to steal information or disrupt operations. This may be an opportunist looking for ways to steal information that they can sell or which can help them in their career, or a disgruntled employee looking for ways to hurt an organization, or punish or embarrass their employer.
  2. Negligent Insider – an employee who does not follow proper IT procedures and/or a developer who doesn’t follow best practices. For example, someone who left their computer without logging out, or an administrator who did not change a default password or a user that failed to apply a security patch within the IT-approved window. Or even an employee that used their company-owned assets in unsecured WiFi or other open internet access points without a VPN or VDI.
  3. Compromised Insider – A common example is an employee whose computer has been infected with malware. This typically happens via phishing scams or by clicking on links that cause malware downloads. It can happen through a Bluetooth connection in a public location, where contact cards and maware are downloaded without clicking anything or otherwise engaging in insecure activities. Compromised insider machines can be used as a home base for cybercriminals, from which they can scan file shares, escalate privileges, infect other systems, and more.

Download now to learn how to combat insder threats.

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Applications, Firewall, Virtual private network (VPN), Network, Firewall, Cloud Applications, VPN, Malware, Bluetooth