Cybersecurity Professionals Enticed By The Dark Side

One in every 13 cybersecurity professionals are considered to be ‘grey hats’ by their colleagues while 20 percent have considered becoming black hats.

The findings were released in a report published today by IT security company Malwarebytes.

The report also found that an organisation in the United Kingdom with 2,500 employees should expect to pay more than £821,000 per year in cybersecurity-related costs.

In cybersecurity terminology, a black hat is a hacker with malicious intent and are responsible for ransomware and cyber breaches. Whereas a white hat are cyber professionals who use their hacking skills to help companies identify vulnerabilities within their security systems.

A grey hat is considered to be a blend of the two. They will probe cybersecurity system for vulnerabilities without permission. Upon discovering a weak link, they will report it to the company often expecting a fee in return; this is opposed to a black hat who would exploit it in a malicious manner.

Seduced by the Dark Side

In their report, Malwarebytes found that: “Fifty-four percent of those we surveyed in the UK believe that a motivating factor for becoming a black hat is the opportunity to earn more money than as a security professional.”

In a report by virtualization based security specialists Bromium, they found that: “High-earning cybercriminals can make $166,000+ per month.”

Speaking to Computer Business Review, Jerome Segura, Senior Malware Analyst at Malwarebytes told us: “Companies need to look for signs of individuals becoming unhappy or unfulfilled in their position and address them early on.”

“Having regular dialogues between HR, managers and employees can help avoid more complicated situations down the line.”

“Money is also a huge factor. Companies need to assign more resources to their security budget, and that includes salaries for security researchers and other technicians.”

“If an employee begins grumbling about pay, and if human resources are unresponsive to his or her requests, then organisations may be setting themselves up for a much larger financial loss down the line,” he added.

Smörgåsbord of Threats

In their survey, Malwarebytes found that 97 percent of UK organisations queried reported that they had been either probed or fell victim to a cyberattack in the last year.

The most common form of attack reported was phishing which accounts for 57 percent of reported attacks.

Adware/spyware and spearphishing, a more direct form of phishing that often includes personal details to give the malicious content an authentic look, come in at second and third most reported.

Ransomware is the fourth most common according to the report and it is considered to be the most serious risk to an IT infrastructure.

30 percent of businesses consider it to be a very serious form of cyberattack and one that has to be mediated with haste.

When asked about the possibility of black hats situating themselves inside companies to gain access to its systems, Jerome Segura of Malwarebytes added: “The insider threat can take different shapes and forms. Usually, disgruntled employees are the most common type, but we cannot exclude more insidious actors infiltrating a company with nefarious goals in mind”

“Proper access control ensures that individuals turning rogue have only limited access to the company’s most important resources,” he noted.

Computer Business Review:

You Might Also Read:

Tackling The Insider Threat: … Where To Start?

« The Future Airman Is A Hacker
Cybersecurity Training For High School Students »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Seric Systems

Seric Systems

Seric is a technology business specialising in security, infrastructure and data management.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.