Your browser is out of date

You are currently using Microsoft Internet Explorer. To use this website without problems, we recommend that you install a new browser (e.g. Google Chrome, Mozilla Firefox, Apple Safari or Microsoft Edge).

I am interested in
The “Search” function is not available at the moment, please try again later.
Please get in contact with us. To contact form

Internal sabotage by your own staff

If employees forward confidential customer data to criminals, this can have far-reaching consequences for a company. Especially if the customers in question end up being blackmailed. These five tips will help you prevent internal sabotage.

9 August 2018, author: Natascha Fabian, photo: Helvetia

Case study: A company employee has access to confidential customer data in the course of his job. He misuses this access and copies part of the master data in order to sell it. The data end up with criminals who attempt to blackmail some of the people concerned. 

Cyber Insurance covers the costs arising from….

  • The necessary legal support in identifying the data in question
  • Emergency measures taken to ward off blackmail
  • Legal notification of the persons affected by a potential data privacy breach
  • A loss analysis including forensics to determine the cause and extent of the insured loss
  • Measures taken to ward off or reduce the threat of reputational damage 

In the event of a claim, Helvetia also provides access to a network of experts including IT security specialists, PR consultants, legal advisors and data privacy specialists. It is vital to restore customers’ confidence as quickly as possible. 

Internal sabotage – what does this mean?

When employees who have access to the company’s systems use them for malicious purposes. 

Five measures for prevention

These five measures can protect against internal sabotage. 

  • Define and implement a password policy: Each employee has their own user profile and can only work in the systems with this profile
  • Define and implement an authorization management system: Employees can only access the systems that they actually need
  • Restrict physical access to critical systems
  • Encrypt sensitive data and monitor and log access to systems/data
  • Constantly monitor critical functional and data privacy parameters in the IT system
Please check your internet connection