{"id":7919,"date":"2016-10-18T15:57:11","date_gmt":"2016-10-18T14:57:11","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/threat-from-within\/"},"modified":"2025-12-15T16:18:24","modified_gmt":"2025-12-15T16:18:24","slug":"threat-from-within","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/","title":{"rendered":"The Threat From Within"},"content":{"rendered":"<p style=\"text-align: justify;\"><em><span style=\"font-size: 16px;\">Last month, we reported on Yahoo\u2019s biggest ever data breach affecting over 500 million users. In reality, barely a day goes past without a big corporate falling victim to a hacking attempt. <\/span><\/em><\/p>\r\n<p><span style=\"font-size: 16px;\">It\u2019s a very real issue \u2013 the online world we live in is full of opportunity, but also risk. Which is why safeguarding information is paramount. Learn how <a href=\"\/uk\/standards\/iso-27001\/certification\/\">ISO 27001 certification<\/a> can enhance your information security management, or explore our <a href=\"\/uk\/standards\/iso-27001\/guides\/iso-27001-beginners-guide\/\">full guide to ISO 27001<\/a> for comprehensive details.<\/span><\/p>\r\n<p style=\"text-align: justify;\">Government is urging small businesses to take preventative measures too, following their figures showing 60% of small businesses becoming victim of a cyber breach during 2014.<\/p>\r\n<h2>The Elephant in the Room<\/h2>\r\n<p style=\"text-align: justify;\">Despite the warnings, it\u2019s understandable for small business owners to be sceptical of the chances of being targeted by a crack team of hackers. And yet, there\u2019s always been an ever-present threat that could easily become a real-world nightmare. It\u2019s not a new malware threat, or phishing scam \u2013 it\u2019s our own people.<\/p>\r\n<p style=\"text-align: justify;\">More than 60% of security events are the result of an inside attack. In some cases, insider threats can be <em>more<\/em> financially damaging and more difficult to defend against. After all, external threats involve someone trying to break in, whereas your staff already have the keys to the front door and knows where the family jewels are stored.<\/p>\r\n<h4 style=\"text-align: center;\"><span style=\"color: #666666;\">More than 60% of security events are the result of an inside attack<\/span><\/h4>\r\n<p style=\"text-align: justify;\">The majority of \u2018breaches\u2019 are from people unintentionally compromising your company\u2019s security \u2013 Kaspersky Lab\u2019s research shows that <a href=\"http:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/Threats-From-Within-EDU-Ebook%20FINAL.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">42% of confidential data loss is by staff<\/a>. They don\u2019t mean to, it\u2019s just that the nature of their job gives them direct access to highly sensitive data. How much information do your IT personnel have access to, for example? The most common answer in a small business is \u201ceverything\u201d.<\/p>\r\n<p style=\"text-align: justify;\">However, it\u2019s not just human error or a lack of controls that let us down \u2013 disgruntled employees are a major source of data breaches. According to the National Cybersecurity Institute, it\u2019s become a top concern over the headline-grabbing hacks.<\/p>\r\n<p style=\"text-align: justify;\">Oft-cited examples include sales people who walk into new jobs with leads and important company information from their previous employer.<\/p>\r\n<p style=\"text-align: justify;\">With this sort of scenario, a solid process for when people leave the company is an obvious answer to minimise the risk. However, behaviours need to be monitored too. If work performance drops off, for example, then it should raise a flag.<\/p>\r\n<blockquote>\r\n<h4 style=\"text-align: center;\"><span style=\"color: #666666;\">40% of people who have access to a corporate infrastructure use the same login on other sites such as Facebook<\/span><\/h4>\r\n<\/blockquote>\r\n<p style=\"text-align: justify;\">A spat that can turn into someone being fired can be a catalyst for revenge. A company that doesn\u2019t have the right protocols in place are then suddenly incredibly vulnerable. Instances of systems being corrupted, important data being deleted and company secrets being shared with competition are commonplace.<\/p>\r\n<p style=\"text-align: justify;\">This problem can be managed with good processes \u2013 every business should have plans in place for these kind of \u2018what if\u2019 scenarios. However, the reality is, employees who are fully engaged and appreciated are less likely to be motivated to commit a crime on the job.<\/p>\r\n<h2>Fixing the Basics<\/h2>\r\n<p style=\"text-align: justify;\">Cyber and data security may sound complicated and expensive, but in reality it\u2019s simple \u2013 and free \u2013 to make big impacts with small steps:<\/p>\r\n<ul style=\"text-align: justify;\">\r\n\t<li>Ensure your staff are aware of your security policies<\/li>\r\n\t<li>Educate them on the consequences of online threats<\/li>\r\n\t<li>Encourage a policy of raising a hand if people are unsure<\/li>\r\n\t<li>Review access rights and privileges to company information<\/li>\r\n\t<li>Scan your systems for potential vulnerabilities<\/li>\r\n\t<li>Make sure you keep software up-to-date<\/li>\r\n<\/ul>\r\n<p style=\"text-align: justify;\">With the government pumping \u00a31.9bn into cyber security over the next 5 years, there are a lot of free resources available, such as free online training for small businesses. If you\u2019d rather get out of the office, the chances are there free seminars on cyber security in your area.<\/p>\r\n<h2>On the Horizon<\/h2>\r\n<p style=\"text-align: justify;\">Cyber security is deemed a \u2018Tier 1\u2019 threat by the government, reflected by the aforementioned planned spend. Since 2014, certain contracts have mandated some kind of cyber or data security certification in order to bid for the work.<\/p>\r\n<p style=\"text-align: justify;\">The pressure will inevitably filter down the supply chain as larger firms seek to ensure their own security controls aren\u2019t undermined by their suppliers. With 43% of CEOs seeing cyber security as a top business risk, the tides are certainly shifting.<\/p>\r\n<p><span style=\"font-weight: 400;\">Learn more by reading our related article on <\/span><strong><a href=\"\/uk\/standards\/cyber-essentials\/insights\/the-biggest-cyberattacks-by-year\/\">The UK\u2019s Latest Data Breaches<\/a><\/strong><\/p>\r\n<hr \/>\r\n<h3 style=\"text-align: center;\"><strong>Want to protect your business? You can get a system in place to manage your information security risks by achieving <\/strong><a href=\"\/uk\/standards\/iso-27001\/certification\/\" rel=\"noopener noreferrer\"><strong>ISO 27001 certification<\/strong><\/a><strong>.<\/strong><\/h3>","protected":false},"excerpt":{"rendered":"Barely a day goes by without a big corporate falling victim to a hacking attempt.","protected":false},"author":24,"featured_media":7572,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[91],"class_list":["post-7919","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Threat From Within | British Assessment Bureau<\/title>\n<meta name=\"description\" content=\"Barely a day goes by without a big corporate falling victim to a hacking attempt. The online world we live in is full of opportunity, but also risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Threat From Within\" \/>\n<meta property=\"og:description\" content=\"Barely a day goes by without a big corporate falling victim to a hacking attempt. The online world we live in is full of opportunity, but also risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:18:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/thumbnail-threat-from-within.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"355\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Threat From Within | British Assessment Bureau","description":"Barely a day goes by without a big corporate falling victim to a hacking attempt. The online world we live in is full of opportunity, but also risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/","og_locale":"en_GB","og_type":"article","og_title":"The Threat From Within","og_description":"Barely a day goes by without a big corporate falling victim to a hacking attempt. The online world we live in is full of opportunity, but also risk.","og_url":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:18:24+00:00","og_image":[{"width":500,"height":355,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/thumbnail-threat-from-within.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/","url":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/","name":"The Threat From Within | British Assessment Bureau","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/thumbnail-threat-from-within.gif","datePublished":"2016-10-18T14:57:11+00:00","dateModified":"2025-12-15T16:18:24+00:00","description":"Barely a day goes by without a big corporate falling victim to a hacking attempt. The online world we live in is full of opportunity, but also risk.","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/thumbnail-threat-from-within.gif","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/thumbnail-threat-from-within.gif","width":500,"height":355,"caption":"Threat from within"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/insights\/threat-from-within\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"ISO 27001","item":"https:\/\/amtivo.com\/uk\/standards\/iso-27001\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"The Threat From Within"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/7919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":4,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/7919\/revisions"}],"predecessor-version":[{"id":9617,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/7919\/revisions\/9617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/7572"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=7919"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=7919"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=7919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}