{"id":48398,"date":"2022-10-21T10:31:39","date_gmt":"2022-10-21T08:31:39","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=48398"},"modified":"2025-11-25T13:33:15","modified_gmt":"2025-11-25T11:33:15","slug":"how-insiders-can-threaten-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/","title":{"rendered":"How Insiders Can Threaten Cybersecurity"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How Insiders Can Threaten Cybersecurity | Harvard VPAL\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/6JE5JdL7nzM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">Hackers, foreign influence, and ransomware are considered the most dominant sources of cyberattacks. However, disgruntled, disillusioned, or negligent employees may pose an even greater threat to a company\u2019s data and networks. In this video, Debora Plunkett, former Director of Information Assurance at the National Security Agency, explains what actions organizations can take to mitigate the risk of insider threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Harvard VPAL <\/span><a href=\"https:\/\/www.getsmarter.com\/products\/harvard-vpal-cybersecurity-online-short-course\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Cybersecurity: Managing Risk in the Information Age<\/span><\/a><span style=\"font-weight: 400;\"> online short course equips you with the skills to assess the threat posed by those closest to your organization.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-transcript\">Transcript<\/h2>\n\n\n\n<p>Insiders pose a threat to cybersecurity, first of all, because they have legitimate access to information, data, networks, storage. And, because they have that legitimate access, if they should choose to use it in an illegitimate way, they pose a huge risk. Because they could put company data at risk. They could put the company itself, the organization itself at risk. They understand the networks. They understand, in many cases, how data is stored. In many cases, they hold the keys to the kingdom.<\/p>\n<p>If you think about the premise for cybersecurity, it is protecting data and information and the networks or infrastructures on which they reside. Insiders, because they have that legitimate access already, they cut the legs off a legitimate cybersecurity effort because they can go undetected, because they can move within an organization and not necessarily be noticed unless they take steps or perform actions that are unusual, and unless the organization\u2019s actually looking for that.<\/p>\n<p>Insiders target an organization\u2019s information systems for a couple of reasons. Sometimes they are just disgruntled. They\u2019re unhappy with the workplace, and they intend to perhaps leave and want to leave by doing harm to an organization. Sometimes they\u2019re disillusioned. Socially disillusioned, politically disillusioned, and they might believe that the organization has information that can support their position or refute their position, one way or the other. And so, they would target information in an organization to embarrass an organization, to expose the inner workings of the organization.<\/p>\n<p>Organizations can improve the acts of insiders, whether intentional or not, in a couple of ways. The first is that they have to understand what normal is and they have to be able to look for the abnormal. So, understanding what normal behavior is of an employee who has legitimate access and then recognizing when that individual takes an action that\u2019s not normal \u2013 downloading large volumes of information or bringing equipment into the workplace that they might not otherwise have or use. Or working very late hours or odd hours are indicators that an employer should take a hard look at to see if there\u2019s anything untoward happening.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers, foreign influence, and ransomware are considered the most dominant sources of cyberattacks. However, disgruntled, disillusioned, or negligent employees may pose an even greater threat to a company\u2019s data and networks. In this video, Debora Plunkett, former Director of Information Assurance at the National Security Agency, explains what actions organizations can take to mitigate the [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":48393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1,199],"tags":[127,120],"article-format":[],"class_list":["post-48398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","category-systems-technology","tag-career-advice","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v26.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Insiders Can Threaten Cybersecurity - GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"Know which warning signs to look for and how to prevent a cyberattack from the inside with Harvard VPAL.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Insiders Can Threaten Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Know which warning signs to look for and how to prevent a cyberattack from the inside with Harvard VPAL.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T08:31:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T11:33:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aaminah Allie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.getsmarter.com\/blog\"}]}]}<\/script>\n<meta property=\"og:video\" content=\"https:\/\/www.youtube.com\/embed\/6JE5JdL7nzM\" \/>\n<meta property=\"og:video:type\" content=\"text\/html\" \/>\n<meta property=\"og:video:duration\" content=\"174\" \/>\n<meta property=\"og:video:width\" content=\"480\" \/>\n<meta property=\"og:video:height\" content=\"270\" \/>\n<meta property=\"ya:ovs:adult\" content=\"false\" \/>\n<meta property=\"ya:ovs:upload_date\" content=\"2022-10-21T08:31:39+00:00\" \/>\n<meta property=\"ya:ovs:allow_embed\" content=\"true\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Insiders Can Threaten Cybersecurity - GetSmarter Blog","description":"Know which warning signs to look for and how to prevent a cyberattack from the inside with Harvard VPAL.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How Insiders Can Threaten Cybersecurity","og_description":"Know which warning signs to look for and how to prevent a cyberattack from the inside with Harvard VPAL.","og_url":"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/","og_site_name":"GetSmarter Blog","article_published_time":"2022-10-21T08:31:39+00:00","article_modified_time":"2025-11-25T11:33:15+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Aaminah Allie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2022\/10\/getsmarter_blog_header-banner_how-insiders-can-threaten-cybersecurity.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/how-insiders-can-threaten-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]},"og_video":"https:\/\/www.youtube.com\/embed\/6JE5JdL7nzM","og_video_type":"text\/html","og_video_duration":"174","og_video_width":"480","og_video_height":"270","ya_ovs_adult":"false","ya_ovs_upload_date":"2022-10-21T08:31:39+00:00","ya_ovs_allow_embed":"true"},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=48398"}],"version-history":[{"count":4,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48398\/revisions"}],"predecessor-version":[{"id":52892,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/48398\/revisions\/52892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/48393"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=48398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=48398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=48398"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=48398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}