No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Five ways to mitigate insider risks during layoffs

May 5, 2023
in Protection
0
Five ways to mitigate insider risks during layoffs



There have been more than 185,000 job losses from 633 companies in the tech sector alone so far in 2023, according to www.layoffs.fyi. Layoffs are impacting all areas of business, including roles that are typically more immune to reduction such as IT, security, software engineers, and finance, all people who are often aware of and have access to sensitive inside information.

Cyber adversaries take advantage of every possible situation, making massive layoffs a huge opportunity. KPMG’s 2022 white paper, “Incentive Based Insider Threats,” said that over the past two years, attackers have shifted tactics and are offering incentives to insiders: payment in exchange for access.

Although the majority of laid-off employees may not pose a threat, there’s always a small possibility. One report on insider risk found that data exfiltration increases when employees leave and 69% of employees are more likely to take data right before they resign. It also found a 23% increase in unauthorized data transfers the day before employees were fired, and a 109% increase on the day their employment was terminated.

Organizations have spent most of their resources on protecting themselves from external cyber threats. But what happens when the adversary has a set of keys and can stroll right in?

The real risk of insider threats

As cybersecurity innovates, so do cybercriminals, and they are supplementing their normal ransomware extortion tactics with outright bribery through social media and the dark web. Adversaries always look for the easiest way in. If they can simply pay someone for access or data, they will.

They just need to find someone with insider knowledge who knows where the “bodies are buried,” that vulnerability that was never patched, or that workaround remote access that was never removed.

Many years ago, as part of a red team engagement, we used social media to identify a disgruntled admin of the client we were hired to attempt to access data from. We ended up paying the admin $200 to get two hard drives with all the data we needed—so we’ve seen this work firsthand.

Maintaining security resilience during staff exits

Our own threat intel team has verified that during these recent months of layoffs, adversaries have actively used publicly-available employee data from websites such as www.layoffs.fyi and parachutelist.com that host layoff lists to target and contact ex-employees in hopes of finding someone disgruntled or desperate enough to make a deal with.

It’s crucial that organizations take necessary precautions to mitigate potential risks and safeguard the organization’s sensitive information from insider threats—whether they’ve laid off employees or not. Organizations concerned with insider risk should consider the following:

Revoke user access. In single sign-on environments, make this process relatively straightforward. In other systems it’s often more challenging, especially when dealing with both on-premise and cloud-based systems. It’s easy to miss something and breaches are often caused by human error. Verify that all access gets actually turned off across all platforms.

Test for shadow IT systems and audit admin rights. Admins can create accounts and have ultimate privileges. Audit all systems to see if any non-approved accounts have been created and shut them down. Test to detect for shadow IT systems that may have been deployed outside of the corporate IT function and can potentially get used for unmonitored access.

Pen test for weak points. Technical personnel know security vulnerabilities and defense weaknesses that cannot get detected by common vulnerability management tools. Perform expert penetration testing to look for hidden security exposures, including assessment of the core business assets to determine if they are at risk.

Secure all software. Audit high-risk, in-house development software for potential rogue access or malicious code. Backdoors in code can take many forms, including:

Hardcoded credentials: Default login information in the code, such as a default username and password.

Remote access capabilities: Functionality in the code that allows remote access to the system, such as a remote shell or remote desktop.

Hidden functionality: Functionality not intended for end-users, such as a hidden admin interface.

Logic bombs: Malicious code triggered when certain actions or conditions are met.

Initiate a threat hunting program. A competent inside adversary will circumvent defenses and bypass security controls. Active defensive measures like threat hunting can monitor for malicious behavior, data theft, and suspicious and abnormal network activity to detect advanced attacks which have flown under the radar.

Given how easy organized crime groups can target disgruntled ex-insiders and considering the current economic climate, security teams need to assess the potential for this kind of malicious activity. Security teams should always make testing and validation along with active threat hunting part of the process when staff exit a business.

Mark Stamford, founder and CEO, OccamSec

Editorial Team

Editorial Team

Related Posts

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now
Protection

The LG UltraGear 39GX90SA-W Gaming Monitor Is $850 Off Right Now

May 16, 2026
You Can Now Pre-Order XReal's R1 Gaming AR Glasses (With the ROG Control Deck)
Protection

You Can Now Pre-Order XReal’s R1 Gaming AR Glasses (With the ROG Control Deck)

May 15, 2026
10 Hacks Every Microsoft Teams User Should Know
Protection

10 Hacks Every Microsoft Teams User Should Know

May 15, 2026
I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training
Protection

I Tried These Four Fitness Watches to See Which Was Best for Hyrox Training

May 15, 2026
Chatbots May Be Giving Out Your Phone Number
Protection

Chatbots May Be Giving Out Your Phone Number

May 15, 2026
Here Are the Best Early Memorial Day Sales so Far
Protection

Here Are the Best Early Memorial Day Sales so Far

May 15, 2026
Load More
Next Post
Kimsuky, WinRAR, Microsoft, AI, Siemens, Apple, Aaran Leyland and more – SWN #295

Kimsuky, WinRAR, Microsoft, AI, Siemens, Apple, Aaran Leyland and more – SWN #295

Popular News

  • Microsoft's New 'Recall' Feature Is Equal Parts Cool and Dangerous

    Microsoft’s New ‘Recall’ Feature Is Equal Parts Cool and Dangerous

    0 shares
    Share 0 Tweet 0
  • The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • Sports betting weighs on consumers’ credit health

    0 shares
    Share 0 Tweet 0
  • What The Clarity Act Means For Ripple And XRP Once Done

    0 shares
    Share 0 Tweet 0
  • LUNC, Avalanche, Fartcoin: Top cryptocurrencies to watch

    0 shares
    Share 0 Tweet 0

Latest News

CLARITY Act ethics fight risks Senate failure - 1

CLARITY Act ethics fight blocks 60 Senate votes

May 17, 2026
0

The Trump ethics fight over crypto is now the biggest obstacle to the CLARITY Act reaching 60 Senate votes. Summary...

Iran to reveal Strait of Hormuz plan amid Israel’s Lebanon, Gaza attacks

Iran to reveal Strait of Hormuz plan amid Israel’s Lebanon, Gaza attacks

May 17, 2026
0

## Market Snapshot The “Iran Military Action Against Neighbors” market is currently experiencing increased attention, with potential YES outcome pricing...

Senior Director, Consulting Careers - Darden School of Business

Senior Director, Consulting Careers – Darden School of Business

May 17, 2026
0

The University of Virginia Darden School of Business seeks a Senior Director, Consulting Careers to join its...

Venezuela’s draft oil law lets ministry set tax rates for each project

Venezuela’s draft oil law lets ministry set tax rates for each project

May 17, 2026
0

Venezuela’s draft oil law lets ministry set tax rates for each project

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.