Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
An employee, fired
#1
Exclamation 
Quote:
[Image: fired-insider-featured.jpg]

Hell hath no fury. A former medical device supplier sabotages deliveries to customers.

When it comes to internal cyberthreats, fired employees tend to fall into the same category as embedded insiders. More often than not, however, employers view that scenario as hypothetical and fail to pay sufficient attention to it. Who would ruin their own reputation and complicate the lives of former colleagues?

Well, practice shows that such people absolutely do exist, and this recent Stradis Healthcare incident provides a glaring example.

A study in revenge

A few weeks after being fired from the medical equipment supply company, a healthcare exec used a secret account to delay the shipping process. As a result, Stradis was unable to deliver supplies on time, including personal protective equipment (PPE) for doctors. The company was forced to shut down all business processes temporarily, and interruptions persisted even months later. In the end, the company resorted to contacting law-enforcement agencies.

Given current circumstances, mainly around the COVID-19 pandemic, the problem was less about losses caused by downtime and missed delivery times, more that medical staff needed PPE like never before. In other words, the culprit not only disrupted the lives of former colleagues, but also put doctors and patients at risk.

How to foil vengeful ex-employees

The Stradis incident shows that workplace revenge, far from being a hypothetical threat, is very real. It must be factored in from the start — when planning a company’s security system.
  • Abandon the practice of “secret accounts” from the outset. Regardless of a person’s position, convenience, or business process specifics, IT security service must be aware of all employee access channels to corporate systems or services.
  • Revoke access to all accounts of outgoing colleagues immediately, and also change the passwords to any shared resources they had access to (social networks, office Wi-Fi, etc.).
  • Back up all business-critical information regularly. After all, the simplest action that a vindictive insider can take is to delete something important.
  • Install security solutions on all work computers. Having appropriate security in place makes infecting the corporate network with malware a lot harder.
For configuring backup and protecting servers and workstations from cyberthreats, look no further than Kaspersky Small Office Security.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
WhatsApp for iOS adds support for Passk...
Passkeys are a great...Harper99 — 14:44
INTEL Arc Graphics 31.0.101.5448
Highlights Inte...harlan4096 — 08:08
Microsoft Edge 124.0.2478.97
Version 124.0.2478...harlan4096 — 08:04
LibreOffice 7.6.7
LibreOffice 7.6.7 ...harlan4096 — 07:46
Brave 1.65.132
Release Channel 1....harlan4096 — 07:37

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
avatar (36)owysykan
avatar (47)beautgok
avatar (37)axuben
avatar (38)ihijudu
avatar (43)tiojusop
avatar (40)Damiennug
avatar (38)acoraxe
avatar (47)contjrat
avatar (39)axylisyb
avatar (42)tukrublape
avatar (42)knigiJow
avatar (44)1stOnecal
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (38)GregoryRog
avatar (43)mediumog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>