Cookies and third-party cookies are activated on this page in order to offer you the best possible service and to provide information and offers. By using the Internet pages of Helvetia, you declare your agreement and consent to data processing by Helvetia. Further information - including how to deactivate cookies - can be found in the Privacy Policy.

  • Herzliche Gratulation!

    I am interested in
    ?
    Please check your internet connection
    Please get in contact with us. To contact form
Expert tips
Corporate customers

Internal sabotage by your own staff

If employees forward confidential customer data to criminals, this can have far-reaching consequences for a company. Especially if the customers in question end up being blackmailed. These five tips will help you prevent internal sabotage.

9 August 2018, author: Natascha Fabian, photo: Helvetia

Case study: A company employee has access to confidential customer data in the course of his job. He misuses this access and copies part of the master data in order to sell it. The data end up with criminals who attempt to blackmail some of the people concerned. 

Cyber Insurance covers the costs arising from….

  • The necessary legal support in identifying the data in question
  • Emergency measures taken to ward off blackmail
  • Legal notification of the persons affected by a potential data privacy breach
  • A loss analysis including forensics to determine the cause and extent of the insured loss
  • Measures taken to ward off or reduce the threat of reputational damage 

In the event of a claim, Helvetia also provides access to a network of experts including IT security specialists, PR consultants, legal advisors and data privacy specialists. It is vital to restore customers’ confidence as quickly as possible. 

Internal sabotage – what does this mean?

When employees who have access to the company’s systems use them for malicious purposes. 

Five measures for prevention

These five measures can protect against internal sabotage. 

  • Define and implement a password policy: Each employee has their own user profile and can only work in the systems with this profile
  • Define and implement an authorization management system: Employees can only access the systems that they actually need
  • Restrict physical access to critical systems
  • Encrypt sensitive data and monitor and log access to systems/data
  • Constantly monitor critical functional and data privacy parameters in the IT system
Recommend this page
Please check your internet connection