Malicious Insiders

Ethical Issues in Information Technology


Past Issues

There have been numerous insider threat issues from the past. Here is a very small list of some issues and exploits that came from the inside:

  • deleting or corrupting business data
  • email phishing attacks
  • using an unapproved personal device for business activities
  • downloading data onto a device that is not secure
  • loosing USB or mobile hard drives
  • lack of training for regular users of company devices
  • writing down user names and passwords and leaving the note on or near the computer
  • leaving the terminal unlocked while the user was away from it for long periods

All of the above points have been and are still going on at businesses today. Most users do not know how easy it is for a malicious insider to take advantage of their account(s) while they are away from their desks.