Current workforce trends feed into rising cybersecurity risks

Hands typing on a keyboard surrounded by security icons
(Image credit: Shutterstock)

The problem posed by insider threats is getting bigger, with 68% of organizations reporting a rise in the frequency of insider attacks in the past 12 months. Insider threats refer to cyber threats that originate from within an organization, meaning employees with authorized access exploit their privilege to steal or leak confidential data. However, insider attacks are not always intentional, and privileged IT users sometimes unwittingly end up compromising their company’s security. In fact, negligent employees or contractors are responsible for 62% of insider incidents.

The potential consequences of insider threat attacks shouldn’t be overlooked. Business leaders are increasingly realizing the importance of making sure their sensitive assets are secure, as the organization's revenue and reputation are at stake. Companies must make it a priority to improve identity security in order to safeguard their critical assets. In particular, controlling who has privileged access to sensitive information is vital to prevent data leaks originating from within the organization.

Business leaders must keep in mind that, in today’s unstable economic climate in which financial gains can be an important driver for malicious insiders, the risk of experiencing a data breach is even bigger. So, organizations must be prepared to navigate the economic uncertainty and combat the surge in insider threats that is intensified by current workforce trends.

Bryan Murphy

Senior Director of Architecture Services & Incident Response at CyberArk.

1. The identity security risks resulting from workforce reductions

Companies must keep in mind that any employees’ layoff or resignation comes with the risk of this person taking confidential information with them. According to the 2023 CyberArk Identity Security Threat Landscape Report, 58% of security professionals globally have reported cases of departing employees saving sensitive work documents outside of policy. So, when facing organizational turmoil, rising concerns about layoffs might result in a surge in insider threats.

One such example is a high-profile insider threat incident at a major drinks manufacturer where an engineer exfiltrated trade secret documents worth nearly $120 million after learning the company was planning to lay her off. The engineer was one of the only two privileged users with exclusive access to the details of a top-secret chemical formula. Although she was ultimately convicted and sentenced for her crime, this case reflects the challenges faced by many businesses in protecting intellectual property and sensitive information, particularly during workforce changes. In fact, according to 68% of security decision-makers worldwide, new identity security concerns will arise as a result of layoffs and workforce churn in the upcoming year.

2. The challenges of building third-party relationships based on trust

While employees do have insider access to sensitive information, they are not the only ones who can expose a company’s confidential data: third party vendors such as contractors can also be responsible for insider threats. If a third-party relationship ends and privileged access to work documents is not immediately revoked, the vendor could continue to view and share a company’s sensitive information, regardless of the circumstances. So, even if an organization and a third party end their relationship on good terms, there is always a risk of company assets being exploited maliciously.

Additionally, external actors can compromise and abuse third-party vendors to gain access to their business partner’s critical information. For example, a few years ago, bad actors exploited a third-party application used by Marriott Hotels to gain access to guests’ sensitive information. Attackers managed to log in to the application using the credentials of two Marriott employees, and the personal records of 5.2 million Marriott guests was leaked as a result. No surprise, then, that the CyberArk 2023 Identity Security Threat Landscape Report reveals that security professionals believe third parties, including partners, consultants and service providers, represent the riskiest human identities.

3. The correlation between the escalating “resenteeism” and insider threats

In today’s uncertain economic climate, filled with layoffs and recession fears, most employees do not want to risk losing their source of income. So, while the Great Resignation was very topical last year, it seems resignations have slowed, with many employees remaining in their current position even if they feel dissatisfied with their jobs or burned out. This has given rise to a workplace buzzword known as “resenteeism” which is used to describe workers who are unhappy in their current position and express their grievances openly.

This phenomenon can have a very negative impact on workplace culture, productivity, and can drive malicious insider threat incidents. For example, an employee who feels undervalued and whose promotion request has been repeatedly denied may develop a sense of resentment towards their organization, which may motivate them to steal or leak sensitive data to “get even”. Some employees might even openly advertise their capacity to exploit their authorized access to jeopardize their organization's security. 63% of businesses do not adequately secure the highest sensitivity access granted to their employees, giving malicious actors ample opportunities to steal sensitive information.

4. Financial hardship is driving data leaks

Many individuals across the UK are facing financial challenges due to rising inflation and the escalating cost of living, which may eventually lead to a rise in financially motivated insider threats. Research shows privilege misuse – employees abusing their authorized access – is the main cause of intentional internal data breaches and is often paired with fraudulent transactions. 59% of all data breach incidents have a financial goal.

A typical situation involves a financial controller, with privileged access to systems where bank accounts and routing information are listed, illicitly moving funds into their own personal account. This practice poses considerable challenges as it not only allows individuals to redirect substantial resources from their organization, but also proves difficult to track.

5. Employees’ increasing stress level triggers security concerns

Workforce reductions and turnover impose a major burden on remaining employees, often resulting in heightened stress levels due to the additional work and responsibilities they’re expected to take on. This can directly contribute to an increase in mistakes. As such, overworked and overstressed employees are more susceptible to falling victims to phishing attacks and other forms of social engineering attacks. Factors like burnout – affecting 59% of UK senior cybersecurity professionals – further amplify the issue as security teams are not as vigilant to potential risks as they should be.

Overworked and overstressed employees could make it easier for phishing attackers to “hook” credentials and, considering 50% of workforce identities have access to sensitive corporate data, these individuals serve as ideal entry points for attackers seeking to gain access to company assets.

It’s time to remove trust from your identity security strategy

In today’s challenging economic times and ever-evolving threat landscape, insider threats are a burning issue. In the face of these rising security risks, organizations must now prioritize a Zero Trust and least privilege approach. This strategy ensures full visibility and control over who can access the company’s sensitive data, facilitating quick detection of access abuse and rapid reaction to prevent a data leak. Only by removing trust from the equation can companies improve cyber resilience, develop a solid identity security strategy and protect their critical assets.

We've featured the best business VPN.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Bryan Murphy is Senior Director of Architecture Services & Incident Response at CyberArk.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
Security padlock in circuit board, digital encryption concept
Rising cost of breaches forces organizations to rethink cybersecurity
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Latest in Pro
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Oracle
Oracle unveils multi-billion dollar investment in UK cloud and AI
WordPress on a laptop
Over 20,000 WordPress sites hit by damaging malware campaign
Trojan
WhatsApp patches security flaw which let hackers install spyware
Latest in News
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Boston Dynamics all electric Altas
This robot can do a cartwheel better than me and now I'm freaking out – but in a good way
A image of Saros character Arjun
Housemarque’s boss is surprisingly positive about Sony’s acquisition – and it’s good news for Saros
Oura Ring 4
One of Apple's top health execs is ditching the company for Oura, and I've never been more convinced smart rings are the future
Living room with Microsoft Xbox Series X (L) and Sony PlayStation 5 home video game consoles alongside a television and soundbar, taken on November 3, 2020.
The PS5 is currently selling faster than the PS4 did in the US, but I'm surprised to discover that the Xbox Series X and S are trailing behind Xbox One
Nvidia logo
Nvidia RTX 5060 Ti could be delayed to mid-April and RTX 5060 to mid-May – is AMD starting to look like a clear winner in the battle of Blackwell vs RDNA 4 GPUs?