{"id":28784,"date":"2021-01-14T04:22:44","date_gmt":"2021-01-13T17:22:44","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/fired-insider\/28784\/"},"modified":"2021-01-14T04:22:44","modified_gmt":"2021-01-13T17:22:44","slug":"fired-insider","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/fired-insider\/28784\/","title":{"rendered":"An employee, fired"},"content":{"rendered":"<p>When it comes to internal cyberthreats, fired employees tend to fall into the same category as embedded insiders. More often than not, however, employers view that scenario as hypothetical and fail to pay sufficient attention to it. Who would ruin their own reputation and complicate the lives of former colleagues? Well, practice shows that such people absolutely do exist, and this recent <a href=\"https:\/\/threatpost.com\/healthcare-exec-stalls-critical-ppe-shipment\/162855\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Stradis Healthcare incident<\/a> provides a glaring example.<\/p>\n<h2>A study in revenge<\/h2>\n<p>A few weeks after being fired from the medical equipment supply company, a healthcare exec used a secret account to delay the shipping process. As a result, Stradis was unable to deliver supplies on time, including personal protective equipment (PPE) for doctors. The company was forced to shut down all business processes temporarily, and interruptions persisted even months later. In the end, the company resorted to contacting law-enforcement agencies.<\/p>\n<p>Given current circumstances, mainly around the COVID-19 pandemic, the problem was less about losses caused by downtime and missed delivery times, more that medical staff needed PPE like never before. In other words, the culprit not only disrupted the lives of former colleagues, but also put doctors and patients at risk.<\/p>\n<h2>How to foil vengeful ex-employees<\/h2>\n<p>The Stradis incident shows that workplace revenge, far from being a hypothetical threat, is very real. It must be factored in from the start \u2014 when planning a company\u2019s security system.<\/p>\n<ul>\n<li>Abandon the practice of \u201csecret accounts\u201d from the outset. Regardless of a person\u2019s position, convenience, or business process specifics, IT security service must be aware of all employee access channels to corporate systems or services.<\/li>\n<li>Revoke access to all accounts of outgoing colleagues immediately, and also change the passwords to any shared resources they had access to (social networks, office Wi-Fi, etc.).<\/li>\n<li>Back up all business-critical information regularly. After all, the simplest action that a vindictive insider can take is to delete something important.<\/li>\n<li>Install security solutions on all work computers. Having appropriate security in place makes infecting the corporate network with malware a lot harder.<\/li>\n<\/ul>\n<p>For configuring backup and protecting servers and workstations from cyberthreats, look no further than <a href=\"https:\/\/www.kaspersky.com.au\/advert\/small-business-security\/small-office-security?icid=au_ksoskd_acq_ona_smm__onl_b2b_kasperskydaily_banner____ksos___\" target=\"_blank\" rel=\"noopener\">Kaspersky Small Office Security<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Hell hath no fury. A former medical device supplier sabotages deliveries to customers. <\/p>\n","protected":false},"author":2581,"featured_media":28785,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[3394,3061,1695],"class_list":{"0":"post-28784","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-fired-employee","10":"tag-insiders","11":"tag-remote-access"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/fired-insider\/28784\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/fired-insider\/22409\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/fired-insider\/17897\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/fired-insider\/24098\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/fired-insider\/22178\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/fired-insider\/20862\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/fired-insider\/24536\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/fired-insider\/23738\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/fired-insider\/29956\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/fired-insider\/9235\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/fired-insider\/38381\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/fired-insider\/16251\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/fired-insider\/16824\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/fired-insider\/14378\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/fired-insider\/26078\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/fired-insider\/29883\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/fired-insider\/26589\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/fired-insider\/23455\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/fired-insider\/28595\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/insiders\/","name":"insiders"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=28784"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/28785"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=28784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=28784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=28784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}