Combatting Foreign Interference

The spectre of foreign interference, ranging from corporate espionage to intellectual property theft, poses significant threats to organisations striving for competitive edge.

Against this backdrop, the release of the 2024 Insider Risk Investigations Report by the DTEX i3 team underscores the imperative for robust cybersecurity measures and collaborative defence strategies within the business community.

Cybersecurity expert and J2 Software CEO John Mc Loughlin says this comprehensive report serves a dual purpose - to provide insights into the world of insider threats and to advocate for enhanced cooperation in safeguarding corporate interests.

"With a notable 70% increase in demand for protection against foreign interference since 2022, organisations are increasingly recognising the urgency of fortifying their defences. The report offers invaluable behavioural analyses within the framework of the Insider Threat Kill Chain, aiding organisations in mitigating risks associated with data breaches, system tampering, and inadvertent data leakage," he explains.

Of particular concern is the revelation that foreign state actors are engaging in sophisticated social engineering tactics to exploit insiders and achieve their clandestine objectives. This includes espionage, intellectual property theft, and infiltration of critical infrastructure, all integral components of broader strategic manoeuvres aimed at undermining organisational integrity.

The proliferation of socially engineered insiders and legitimate talent programs further exacerbates these risks, facilitated in part by advances in artificial intelligence.

However, the report underscores that bolstering insider risk programs alone is insufficient in the face of evolving threats. Collaboration between public and private sectors is essential, with organisations urged to share insights, refine skills, and cultivate partnerships to enhance their defensive capabilities.

Notable entities such as the US Insider Risk Management Centre of Excellence and the Australian Cyber Collaboration Centre exemplify the importance of collaborative initiatives in addressing these challenges.

Moreover, the blurred distinction between internal and external threats necessitates a holistic security approach that transcends traditional boundaries. Understanding human behaviour emerges as a pivotal component in early threat detection and mitigation.

"By fusing technology with psychological insights, organisations can better identify behavioural patterns indicative of malicious intent, thereby strengthening their defensive posture," McLoughlin says.

Central to this endeavour is the cultivation of bidirectional loyalty within organisations, fostering a workforce characterised by transparency, respect, and mutual trust. Such an environment not only enhances organisational resilience but also serves as a deterrent against external manipulation.

"The 2024 Insider Risk Investigations Report serves as a call to action for businesses to prioritise cybersecurity and adopt collaborative defence strategies. Its actionable insights and recommendations provide a roadmap for fortifying defences against the pervasive threat of foreign interference, underscoring the imperative of unity and collaboration in safeguarding corporate assets," McLoughlin concludes. 

Image: Unsplash

You Might Also Read: 

Businesses Must Prioritise Safeguards Against Common Threats:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Securing Critical Infrastructure
Using AI To Defend Against AI-Enhanced BEC Scams »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

StepStone

StepStone

StepStone is one of the leading online job platforms in Germany, and other countries, covering all industry sectors including IT and cybersecurity.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

IntelliBridge

IntelliBridge

IntelliBridge supports our nation’s most critical missions by solving complex technology, intelligence, and mission support challenges.