ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Employees Can Be Your Business’ Best Defense Policy

Employees Can Be Your Business’ Best Defense Policy

A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its greatest advantages if trained properly. To demonstrate this, let’s consider a few examples that exemplify either case.

Tesla’s Recent Near-Incident

In late August, a Russian national was arrested and charged with conspiracy to intentionally cause damage to a protected computer for attempting to recruit an employee of Tesla to install malware on the network of the Nevada company’s Gigafactory, as confirmed by owner Elon Musk via Twitter.

According to court documents, it was in mid-July that this hacker—27-year-old Egor Igorevich Kriuchkov—established contact with a Tesla employee whom he had briefly met in 2016. Using the popular messaging application WhatsApp, Kriuchkov set up an in-person meeting with the unnamed employee. By August 3, Kriuchkov tried to recruit this employee to assist him in stealing data from Tesla and extorting money in exchange for keeping this data private.

The attack would work like this: by simulating a Distributed Denial of Service (DDoS) attack, the group that Kriuchkov was working with could then steal Tesla’s data unnoticed. Then, the group would reach out and demand that Tesla pay them money to keep this data private.

After a few days, Kriuchkov requested another meeting with the employee to iron out the details. However, the employee had already made contact with the FBI to inform them, and as the FBI surveilled the meeting, the employee was able to get Kriuchkov to repeat his plan, listing other companies who the group had worked against and assuring the employee that their past conspirators were still employed by their companies. The employee was even told that another coworker could be made to look responsible if there were someone that this employee had a grudge against.

Ultimately, enough evidence was collected to arrest Kriuchkov, and he could now face up to five years in prison.

So, it was because of the employee’s efforts that Tesla was able to dodge a significant bullet here.

What Other Companies Have Experienced, and What it Shows

While Tesla was able to sidestep this threat due to the diligence and honesty of their employee, many companies have not been nearly so lucky. According to the Ponemon Institute, insider threats (such as the one that Kriuchkov and his co-conspirators were encouraging) have risen in frequency by 47 percent over the past two years, with the average incident increasing in cost by 31 percent.

Therefore, the importance of minimizing these incidents in your own business is clear. To do so, you need to ensure that your employees are on your side and are prepared to protect your business.

How to Minimize Insider Threats

The name of the game is going to be education. Not only will you need to make sure your employees are motivated to protect your business, they will need to know how to do so. For starters, we recommend that you do a few things:

  • Involve security in your company culture. Whatever impact a cybercrime has on your business, it will also have on your employees by association. By making this clear and giving everyone ownership of the company’s cybersecurity, you are unifying your team and putting everyone on the same side.
  • Keep your team up to date on trending attacks and acceptable behaviors. Like so many things in the business landscape, cybercrime is always shifting. If you and your team are going to be able to resist attempts of all kinds, everyone’s knowledge will have to be kept current. It also helps to establish acceptable use policies to minimize your vulnerabilities, so if you choose to do so, make sure they are properly adhered to.
  • Train your team to recognize, and respond to, cyberattacks appropriately. When your team does encounter a cyberattack of any kind, they need to know how they are to proceed. Establishing these procedures and developing plans to deal with these circumstances is an important step for you to take.

Whether you need assistance in securing your infrastructure with the proper protective solutions, training your team in more secure behaviors, or both, you can turn to ClearView IT for assistance. To learn more about how we can make it more likely that you’ll have an outcome closer to Tesla’s than to so many others’, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Managed IT Services Data Recovery Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Browser Managed Service Windows 10 IT Support Apps Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Networking Windows Gadgets Artificial Intelligence Workplace Strategy Managed IT services WiFi Encryption Server Mobile Device Management Information Remote App Virtualization Spam Business Technology Blockchain Bandwidth Budget Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 History Conferencing Access Control Data Security Big Data BDR Health Analytics Cybercrime Wi-Fi Compliance Patch Management Help Desk Vendor Hacking Cost Management Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Document Management Hacker IT Management Save Money Training Remote Computing Augmented Reality Word BYOD IBM Website Computing Vendor Management Hard Drive Applications Project Management Search... Vulnerabilities Best Practice Legal Retail Mobile Office Data storage Alert Money Managed Services Hiring/Firing Customer Service Unified Threat Management Data loss Outlook Firewall Password iPhone Cleaning Education Chrome Cortana Update Robot Content Filtering Data Breach Router Mobile Computing Paperless Office Antivirus The Internet of Things Marketing Maintenance YouTube Running Cable Twitter Law Enforcement Monitoring Laptop Storage End of Support Healthcare Printer Websites Remote Workers Mobility Meetings Windows 7 Free Resource Google Maps Scam Sports Travel User Social Windows 11 SaaS DDoS Virtual Reality Social Engineering How To Cryptocurrency Black Market VPN Tech Terms Images 101 Integration Display Politics Managed IT Machine Learning Digital Settings Virtual Assistant Lithium-ion battery Employees PowerPoint Solid State Drive Administration Taxes Avoiding Downtime Processors Holidays Presentation Processor Specifications Drones IT Consultant Chromebook Cooperation Automobile Video Conferencing Physical Security Customer Relationship Management Virtual Machines Co-Managed IT How To Computer Repair Entertainment Multi-factor Authentication Wireless Technology Microchip Flexibility Start Menu Professional Services eWaste Downloads Computer Care Vulnerability Saving Time Downtime Hack Safety Identity Theft Notifications Managed Services Provider Software as a Service Data Protection Computers Bitcoin Unified Communications Virtual Desktop Virtual Private Network Experience HIPAA Google Docs Telephone Bluetooth Distributed Denial of Service Current Events Office Tips Private Cloud Memory Excel Solutions Disaster Fileless Malware Tablet Smart Devices Flash G Suite Tip of the week Workplace Business Growth Mouse VoIP Gamification Remote Working Telephone Systems Tracking Company Culture Recovery Regulations Trend Micro Competition Telephone System AI Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Inbound Marketing Web Server Transportation Scams Entrepreneur Google Wallet SharePoint LiFi Content Banking Digital Payment Desktop Wasting Time Electronic Medical Records Documents Messenger Worker Accountants eCommerce Application Deep Learning Modem Videos Access Database Surveillance Business Intelligence Cables Public Cloud Managing Costs Hosted Solution Time Management Electronic Payment Business Metrics Health IT Securty Books Equifax SSID Audit Media Spyware Tactics Development Domains Language Hard Drive Disposal Employer/Employee Relationships Society Point of Sale File Sharing Virtual Machine Phone System Username Redundancy Reviews Reading Startup Optimization Monitors Freedom of Information Visible Light Communication Shortcuts Navigation 2FA Cache Addiction email scam Teamwork Windows 8 Workers Mobile Security Hypervisor Unified Threat Management Data Storage User Tip Shopping Relocation Legislation Public Speaking Displays News Medical IT Advertising Be Proactive Printing Evernote Paperless Streaming Media Network Management Work/Life Balance CCTV SQL Server Computer Accessories Tech Support Licensing Keyboard Touchscreen PCI DSS Emergency Proxy Server Gig Economy Emails Humor Hard Drives Computer Malfunction Fake News Workplace Strategies Business Communications In Internet of Things Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure intranet Wireless Hacks Samsung Device security Managed IT Service Shortcut Network Congestion Management Regulations Compliance Reliable Computing Uninterrupted Power Supply Wireless Headphones Memes Heating/Cooling Writing Webcam Microsoft Excel Environment Social Networking Tech Human Resources Windows XP Business Mangement Going Green Net Neutrality Business Cards Tablets Error Financial Data Bookmark Risk Management Scalability IT Troubleshooting Smart Technology Proactive IT Google Calendar Term Google Apps Administrator Download Text Messaging Supercomputer Piracy Bring Your Own Device HTML Virus Telework Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Music Comparison Google Play Google Drive Upload Procurement Software License Staffing Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Business Owner IP Address Supply Chain Television Security Cameras Botnet Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Rental Service Cabling Devices Cyber security Micrsooft Customer Resource management Organization

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?