• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

When Hackers Wear Suits: How to Protect Your Team from Insider Cyber Threats

johny899

New Member
Content Writer
Messages
974
Reaction score
3
Points
23
Balance
$1,220.8USD
It sounds crazy, but a hacker who dresses like a business person is a very real threat today. The below content provides an explanation for insider cyber threats.

What are Insider Cyber Threats?​

Insider threats come from people already working for the company (employees, contractors, or business partners). They use their authorized access to steal company assets or cause damage. They do not have to break in; they enter through the front door.

How Hackers Are Able to Enter Companies​

I read on BleepingComputer that how hackers falsely represent themselves as job applicants and use social engineering to gain the trust of recruiters. Reading how they deceive others made me feel uneasy.

They use several methods to accomplish this:
  • Create a fake identity, including resume, online profiles, etc.
  • Create a deep fake video that has them interviewing for a position remotely.
  • Use stolen identification to provide proof that they are who they claim to be.
  • Take advantage of the remote hiring process, where they are not required to meet face to face (in person) with the hiring manager.
Isn't that a scary thought?

Reason It’s a Big Issue​

Fake staff can be granted complete access to all tools and information of the company as soon as they are employed. They may be able to steal files, transfer money, load malware on to computers. They can destroy computer systems without requiring physical entry to the premises. And worst of all? Everybody believes they are trusted employees.

Protecting Your Employees​

Employers can take simple steps to protect their employees:
  • Verify the identity of every person brought in to be hired.
  • Provide access to only what is necessary. No additional access rights.
  • Keep an eye out for very unusual activity, such as late night system logins or downloading very large files.
  • Train staff to report suspicious or odd activities.

Conclusion​

Not every hacker has on a black hoodie. On some occasions, the hacker is a well-dressed individual who smiles at business meetings. Yes, it’s frightening. However, if we are prudent and use common sense, we can avoid being a victim.
 
Top