Cybersecurity Professionals Enticed By The Dark Side

One in every 13 cybersecurity professionals are considered to be ‘grey hats’ by their colleagues while 20 percent have considered becoming black hats.

The findings were released in a report published today by IT security company Malwarebytes.

The report also found that an organisation in the United Kingdom with 2,500 employees should expect to pay more than £821,000 per year in cybersecurity-related costs.

In cybersecurity terminology, a black hat is a hacker with malicious intent and are responsible for ransomware and cyber breaches. Whereas a white hat are cyber professionals who use their hacking skills to help companies identify vulnerabilities within their security systems.

A grey hat is considered to be a blend of the two. They will probe cybersecurity system for vulnerabilities without permission. Upon discovering a weak link, they will report it to the company often expecting a fee in return; this is opposed to a black hat who would exploit it in a malicious manner.

Seduced by the Dark Side

In their report, Malwarebytes found that: “Fifty-four percent of those we surveyed in the UK believe that a motivating factor for becoming a black hat is the opportunity to earn more money than as a security professional.”

In a report by virtualization based security specialists Bromium, they found that: “High-earning cybercriminals can make $166,000+ per month.”

Speaking to Computer Business Review, Jerome Segura, Senior Malware Analyst at Malwarebytes told us: “Companies need to look for signs of individuals becoming unhappy or unfulfilled in their position and address them early on.”

“Having regular dialogues between HR, managers and employees can help avoid more complicated situations down the line.”

“Money is also a huge factor. Companies need to assign more resources to their security budget, and that includes salaries for security researchers and other technicians.”

“If an employee begins grumbling about pay, and if human resources are unresponsive to his or her requests, then organisations may be setting themselves up for a much larger financial loss down the line,” he added.

Smörgåsbord of Threats

In their survey, Malwarebytes found that 97 percent of UK organisations queried reported that they had been either probed or fell victim to a cyberattack in the last year.

The most common form of attack reported was phishing which accounts for 57 percent of reported attacks.

Adware/spyware and spearphishing, a more direct form of phishing that often includes personal details to give the malicious content an authentic look, come in at second and third most reported.

Ransomware is the fourth most common according to the report and it is considered to be the most serious risk to an IT infrastructure.

30 percent of businesses consider it to be a very serious form of cyberattack and one that has to be mediated with haste.

When asked about the possibility of black hats situating themselves inside companies to gain access to its systems, Jerome Segura of Malwarebytes added: “The insider threat can take different shapes and forms. Usually, disgruntled employees are the most common type, but we cannot exclude more insidious actors infiltrating a company with nefarious goals in mind”

“Proper access control ensures that individuals turning rogue have only limited access to the company’s most important resources,” he noted.

Computer Business Review:

You Might Also Read:

Tackling The Insider Threat: … Where To Start?

« The Future Airman Is A Hacker
Cybersecurity Training For High School Students »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Upfront Security

Upfront Security

Upfront Security helps companies with innovative products & services to prevent, recognise and recover from (identity) fraud.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.