Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning through virtual backdoors and unauthorized accounts, Jason could continue accessing his former employee’s data and systems. Over two years after leaving the company, Needham went on to repeatedly download intellectual property such as engineering schematics, internal project proposals, budgeting and pricing documentation, marketing strategies, and even access the email accounts of other employees. The information he stole was estimated at almost half a million dollars in value. Under the Computer Fraud and Abuse Act, he eventually received an eighteen-month prison sentence, two years of supervised release, and hefty monetary penalties.
This popular story became an early case study highlighting the importance of managing threats with a broader scope. When finding the culprits behind data breaches, most people automatically think of a distant attacker attempting to hack into their systems and steal their valuable data. However, thanks to authorized access and internal knowledge of the environment, as seen in Jason’s case, employees and contractors can often expose your company to a greater risk than any outsider.