The Enemy Within! Can Insider Sabotage Be Stopped?
Dinesh Dino
Triple Australian Cyber Awards Finalist |@ Wurth Australia Pty Ltd - Cyber Risk Management & Service Optimisation & AI | Blogger | Prize Winning Lecturer - CIM, MBA, MSc programs | Keynote Speaker | AISA | ISACA | ISC2
We invest millions in firewalls, intrusion detection systems, and cutting edge AI cybersecurity tools, yet the most significant threat often enters with a company ID badge. The recent conviction of an IT administrator at?Voova Ltd.?who set up a ‘kill switch’ on the company's network illustrates that the threat may not be an unknown hacker lurking in a basement; it can be Bob from IT, upset over a denied vacation request.
Unlike cybercriminals hiding in the shadows, insider threats originate from employees, contractors, or business partners with access to your systems. Whether driven by revenge, negligence, or a simple mistake (like Dave in accounting clicking on yet another phishing email), insider threats are particularly dangerous because they exploit valid credentials. The consequences? Data breaches, business disruptions, or, in this instance, an IT admin with a personal vendetta shutting down the corporate lights at?Voova Ltd.
How Do You Stop Your Own People from Going Rogue?
If you give employees unlimited access, you might as well hand them a red button labelled "Do Not Press." Organizations should apply the principle of least privilege (PoLP), ensuring employees can only access what’s necessary for their job. This means implementing role-based access control (RBAC), so Bob can’t go poking around HR records, time-limited access for sensitive areas, and frequent access reviews to ensure ex-employees don’t still have system credentials (yes, it happens).
Security isn’t about paranoia; it’s about being smart. Behavioural analytics and AI-driven monitoring can flag when Steve from IT logs in at 3 AM and starts downloading terabytes of data. With the right tools, you can spot unusual logins or access attempts, flag massive file transfers before your intellectual property ends up on Reddit, and trigger alerts for strange admin activities (like, say, installing a kill switch?). A well-documented audit process ensures no one can claim, "It wasn’t me!" when suspicious activity is discovered. Organisations should log all privileged access to a?central?system (not on an Excel spreadsheet, please), store logs?immutably?to prevent tampering, and conduct regular security audits—preferably before a disaster, not after.
No offence to IT admins, but giving unrestricted system access is akin to handing your teenager the keys to a sports car with no curfew. Organisations must utilise?multi-factor authentication (MFA)?for all admin accounts, implement?just-in-time (JIT) access?so that privileged users don’t have standing access indefinitely, and record all high-privilege sessions (because receipts matter). Rather than allowing rogue employees to install their kill switches, organisations should implement?automated safeguards?that lock accounts when they exhibit erratic behaviour (such as mass deleting files), trigger an emergency response before any real damage occurs, and completely shut down access if critical infrastructure is being tampered with.
Oops, It Happened: Now What?
Despite all precautions, sometimes someone?goes?rogue. The key is to respond swiftly and decisively.?Isolate the Threat?by disabling compromised accounts before the damage spreads.?Conduct a Forensic Investigation?using logs and security tools to understand what happened.?Report and Comply?with regulatory requirements and, if necessary, pursue legal action.?Learn and Improve.?If Bob managed to shut down your network, you need better controls.
A Little Less Trust, A Lot More Security
Let’s be honest: no one wants to think their employees could betray them. However, as recent events have shown,?insider threats are real and dangerous. The solution isn’t paranoia; it’s preparation. By implementing the proper security measures, companies can keep their networks safe, their operations intact, and, most importantly, prevent Bob from having the last laugh.