Monday, August 27, 2018

7 tips on how to handle cyber-sabotage and other insider cyber threats


Your employees are your company's weakest link, and therefore, your greatest threat to suffering a cyber-attack and resulting data breach. While employee negligence (that is, employees not knowing or understanding how their actions risk your company's data security) remains the biggest cyber risk, another is growing and also demands your attention—the malicious insider.

According to one recent report, malicious insiders are responsible for 27 percent of  all cybercrime. Over at her Employment & Labor Insider Blog, Robin Shea suggests that one recent workplace embarrassment for an employer was the result of internal cyber-vandalism, and not external hacking.

Dark Reading reports on a recent survey, entitled, "Monetizing the Insider: The Growing Symbiosis of Insiders and the Dark Web."

"Recruitment of insiders is increasing, and the use of the dark web is the current methodology that malicious actors are using to find insiders," explains researcher Tim Condello, technical account manager and security researcher at RedOwl.
Cybercriminals recruit with the goal of finding insiders to steal data, make illegal trades, or otherwise generate profit. Advanced threat actors look for insiders to place malware within a business' perimeter security. …
There are three types of people who fall into the "insider" category, says Condello: negligent employees who don't practice good cyber hygiene, disgruntled employees with ill will, and malicious employees who join organizations with the intent to defraud them. 

What is a company to do? I've previously discussed how to protect against the negligent employees who don't practice good cyber hygiene—training, training, and more cyber-training.

No amount of training, however, will stop a disgruntled employee with ill intent, or a malicious employee who joins to do harm.

These latter two categories need more specialized attention—an insider threat program. The Wall Street Journal explains:

Companies are increasingly building out cyber programs to protect themselves from their own employees.… Businesses … are taking advantage of systems … to find internal users who are accidentally exposing their company to hackers or malicious insiders attacking the company. These "systems," however, can prove costly, especially for the small-business owner. While investment in a technological solution is one way to tackle this serious problem, it's not the only way. Indeed, there is lots any company, of any size, with any amount of resources, can do to develop an insider threat program.

Aside from the expense of costly monitoring programs, what types of issues should employers include in an insider threat program? Here are seven suggestions:

  1. Heightened monitoring of high-risk employees, such as those who previously violated IT policies, those who seek access to non-job-related business information, and those who are, or are likely to be, disgruntled (i.e., employees who express job dissatisfaction, who are on a performance improvement plan, or who are pending termination).

  2. Deterrence controls, such as data loss prevention, data encryption, access management, endpoint security, mobile security, and cloud security.

  3. Detection controls, such as intrusion detection and prevention, log management, security information and event management, and predictive analytics.

  4. Inventories and audits for computers, mobile devices, and removable media (i.e., USB and external hard drives), both during employment and post-employment. 

  5. Policies and programs that promote the resolution of employee grievances and protect whistleblowers.

  6. Pre-employment background checks to help screen out potential problem employees before they become problems. 

  7. Termination processes that removes access as early as possible for a terminated employee.

No company can make itself bulletproof from a cyber-attack. Indeed, for all businesses, data breaches are a when issue, not an if issue. However, ignoring the serious threat insiders pose to your company's cyber security will only serve to accelerate the when.

Friday, August 24, 2018

WIRTW #520 (the “cucaracha” edition)


Welcome to fun-fact Friday.

The Mexican folk song La Cucaracha has a long and fascinating history. It was popularized during the Mexican Revolution when each army would write verses as battle songs. Amazingly, one such verse, which has become the most popular version of the song, references marijuana:

The cockroach, the cockroach,
can't walk anymore
because it doesn't have,
because it's lacking
marijuana to smoke.

Maybe this explains why Speedy Gonzales was so speedy.


Here's what I read this week:

Thursday, August 23, 2018

Dirty Harry, the worst recruiter ever


After yesterday's detective novel of a post, I thought I'd go with something light and airy today (if you consider watching Dirty Harry conduct a job interview of a female interviewee, while sharing his views on feminism and job quotas, light and airy).


My worst job interview? The interviewer forgot my appointment, and never showed up to work. It all worked out in the end. I came back a week later, and that's how I got my first job after law school.

What's you job interview horror story? Share in the comments below, and I'll pull the best (or the worst?) for a future post.

Wednesday, August 22, 2018

A cautionary tale about an attempted fraud (updated, 11:25 am)


I was recently the target of a highly sophisticated legal-services fraud. Thankfully, this scam set off my Spidey sense from the beginning, and I did not fall for it. I'm sharing so that others can learn the lengths that some will go to steal from professionals. (My apologies in advance. This post is long, but I think it's worth your time.)

Tuesday, August 21, 2018

An expensive lesson on disability harassment



With of all of the attention the #MeToo Movement has provided sexual harassment, employers must not forget that all forms of unlawful workplace discrimination include unlawful harassment.

This includes disability harassment.

For example, consider Caldera v. Department of Corrections & Rehabilitation (Cal. Ct. App. 7/9/18).

Monday, August 20, 2018

EEOC sues on behalf of harassed Catholic employee


Religion a funny thing. Throughout the history of mankind it's fueled so much hate, war, and death. And yet, it brings so much peace, comfort, and love to so many people.

My philosophy is live and let live. You believe what you want, and I'll believe what I want. Your religion is none of my business, just as mine is none of yours.

The world we be a better place is everyone lived this message. But not everyone does.

Friday, August 17, 2018

WIRTW #519 (the “R-I-P-R-E-S-P-E-C-T” edition)




While I've always loved Aretha's music, and her voice, and her soul, I never appreciated until watching yesterday's tributes how key of a role she played in the civil rights movement.

Rest in peace Queen of Soul. Your message and your spirit will be missed as much as your voice.

Here's what I read this week: