Insider threat - Managing people security
Published on 22 January 2020
Contents
- Introduction
- What is financial crime?
- What is ‘insider threat’?
- The Fraud Ratio
- Unusual behaviour in the workplace
- Risk areas
- What types of threat do organisations experience?
- What does the insider threat look like?
- Privileged users
- Robust recruitment
- Behavioural 'red flags'
- What can you do to protect your organisation?
- Conclusion
- Glossary of terms
- References and additional reading
References and additional reading
Audit Scotland, 2018. Retrieved from: http://www.audit-scotland.gov.uk/news/councils-need-to-learn-from-%C2%A31-million-fraud-at-dundee-city-council (link opens in this tab), accessed 05/10/2018
Button, Professor Mark & Gee, Jim, (2015) ‘The financial cost of healthcare fraud 2015’, Centre for Counter Fraud Studies, Portsmouth
Chartered Institute of Personnel and Development (CIPD) (2012) ‘Staff fraud and dishonesty: managing and mitigating the risks’, London
Credit Industry Fraud Avoidance Service, (CIFAS), 2016 Employee Fraudscape, 2016: Insider fraud threats of 2015 and what you can do to protect your workplace. Retrieved from: https://www.cifas.org.uk/insight/reports-trends (link opens in this tab), accessed: 05/10/2018
Crowe Clark Whitehill, (2017), Annual Fraud Indicator 2017, identifying the cost of fraud to the UK economy. Retrieved from: https://www.experian.co.uk/assets/identity-and-fraud/annual-fraud-indicator-report-2017.pdf (link opens in this tab), accessed on 19/03/2019
Riney, F.A (2018) ‘Two-step fraud defence system: prevention and detection’, Wiley
Searle, R., Rice, C (2018) ‘Managing Organisational Change, Practitioner Toolkit’, CREST
Additional reading (by topic)
Mitigating the risk
Common Sense Guide to Mitigating. Insider Threats, Fifth Edition. The CERT Insider Threat Center. December 2016. Retrieved from: https://resources.sei.cmu.edu/asset_files/TechnicalReport/2016_005_001_484758.pdf (link opens in this tab), accessed: 01/10/2018