Sam feels undervalued. He’s recently been working late and at weekends, but his payrise request was denied.
When a competitor offers to pay Sam in exchange for some corporate files, Sam jumps at the chance.
Competitor emails Sam
Sam sends files to personal email address
Competitor offers Sam a job in exchange for more files
Sam sends the files and quits his job
- Loss of IP to competitor
- 10% market share decrease
- 1,000 hours remediation
Sam’s actions are uncovered after he’s left. The IT team can only track the data as far as Sam’s personal email address, but immediately alarm bells start ringing given its sensitivity. The Legal team notifies local law enforcement, and an investigation is launched. But the damage has been done: the files have been shared throughout the competitor’s organization and the corporate secrets have been spilled.
Why do people break the rules?Find out now
Get the experts’ opinions
Are people your greatest defense or your biggest risk?
Read the latest industry research to find out.Read now
Why do people cause data breaches?
Join our live webinar with Lisa Forte for a deep dive into the psychology behind insider data breaches.Sign up today