{"id":13569,"date":"2018-10-12T09:10:11","date_gmt":"2018-10-12T17:10:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/12\/news-7336\/"},"modified":"2018-10-12T09:10:11","modified_gmt":"2018-10-12T17:10:11","slug":"news-7336","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/12\/news-7336\/","title":{"rendered":"Workplace violence: the forgotten insider threat"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000<\/strong><\/p>\n<p>Organizations are no stranger to insider threats. In fact, for those who have been around long before the Internet, workplace violence, (alongside spying) is a problem many businesses have seen before and sought to address.<\/p>\n<p>However, the adoption and use of the Internet completely changed the way organizations run and grow their businesses, how customers can communicate with companies, and how employees do their jobs. And with this advancement\u2014as we\u2019re well aware by now\u2014comes new, more sophisticated challenges that can compound the risks that organizations face from insiders.<\/p>\n<p>When it comes to security, many enterprises are focused on beefing up their system and network defenses to keep outside hackers from getting their hands on digital assets. In addition, organizations are now more aware of the threat that malicious insiders pose\u2014whether that&#8217;s stealing proprietary information or spying for competitors. Yet it seems that little or no attention is given to addressing workplace violence as a whole.<\/p>\n<h3>An overview of workplace violence<\/h3>\n<p>In our previous <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/08\/the-enemy-is-us-a-look-at-insider-threats\/\" target=\"_blank\" rel=\"noopener\">blog on insider threats<\/a>, we defined workplace violence (WPV) as \u201cviolence or threat of violence against employees and\/or themselves.\u201d This can manifest in the form of physical attacks, threatening or intimidating behavior and speech (written, verbal, or electronically transmitted), harassment, property damage, or other acts that could put people at risk.<\/p>\n<p>Early signs of potential for violence include threats of bodily harm (often framed as a joke, a passing comment, or a verbalization of\u00a0violent thoughts), insults, passive-aggressive actions, dramatic or unreasonable demands, withdrawal (especially if they used to be sociable), and sudden undue whining or complaining. <a href=\"https:\/\/www.soloprotect.com\/us\/worker-safety-blog\/workplace-violence\/early-signs-of-workplace-violence.asp\" target=\"_blank\" rel=\"noopener\">Other manifestations<\/a>\u00a0may not be evident at first, too.<\/p>\n<p>Knowing this, one might think it is essential for organizations of any size to be able to identify and tackle workplace violence head on, on top of improving their network defenses. Sadly, this isn\u2019t the case.<\/p>\n<p>Although organizations are <a href=\"https:\/\/www.osha.gov\/as\/opa\/worker\/employer-responsibility.html\" target=\"_blank\" rel=\"noopener\">required by law<\/a>\u00a0to keep employees safe by creating a healthy, hazard-free workplace environment, <a href=\"https:\/\/talglobal.com\/knowledge-center\/workplace-violence-2017-trends\/\" target=\"_blank\" rel=\"noopener\">almost half of executives<\/a>\u00a0in a corporate survey conducted by TAL Global, a security and risk management company, believe that \u201cworkplace violence is not an issue that needs to be addressed.\u201d It\u2019s also frustrating to note that more than half of these executives \u201cdo not believe that workplace violence will create a negative impact on their budget.\u201d<\/p>\n<p>This is a serious oversight, especially when the Department of Justice estimates that workplace violence costs US businesses about <a href=\"https:\/\/leb.fbi.gov\/articles\/featured-articles\/workplace-violence-prevention-readiness-and-response\" target=\"_blank\" rel=\"noopener\">$36 billion per year<\/a>\u00a0in lost productivity, property, and most importantly, employee lives.<\/p>\n<h3>The workplace, redefined<\/h3>\n<p>While we\u2019re about WPV, it\u2019s important to remind ourselves that the definition of \u201cworkplace\u201d has evolved over time and is no longer confined within the walls of a traditional office building. Today, the workplace can be your home, your favorite coffee shop, the local library, or even a\u00a0<a href=\"https:\/\/www.lifewire.com\/what-is-coworking-2377413\" target=\"_blank\" rel=\"noopener\">co-working space<\/a>.<\/p>\n<p>Over the last decade, the number of telecommuting workers has increased by 115 percent, according to\u00a0<a href=\"https:\/\/www.flexjobs.com\/2017-State-of-Telecommuting-US\/\" target=\"_blank\" rel=\"noopener\">a 2017 report<\/a>\u00a0from Global Workplace Analytics and FlexJobs. And while\u00a0<a href=\"https:\/\/money.cnn.com\/2017\/06\/21\/pf\/jobs\/working-from-home\/index.html\" target=\"_blank\" rel=\"noopener\">working from home is beneficial<\/a>\u00a0for both employees and employers, it also comes with its own risks.<\/p>\n<p>While organizations must be sure to protect their\u00a0sensitive client and company data accessed outside of the office network by <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/08\/how-to-secure-your-remote-workers\/\" target=\"_blank\" rel=\"noopener\">remote workers<\/a>, they also have to ensure workplace security in the telecommuter\u2019s home office.<\/p>\n<p>Why? Because a home office, according to the Occupational Safety and Health Administration, is still under the employer\u2019s jurisdiction. Therefore, they must <a href=\"https:\/\/www.osha.gov\/enforcement\/directives\/cpl-02-00-125\" target=\"_blank\" rel=\"noopener\">make sure that home offices are safe and hazard-free<\/a>. This could also mean that policies governing workplace violence could be adapted from the office to the home office.<\/p>\n<h3>Is workplace violence on the rise?<\/h3>\n<p>Perhaps. The TL;DR answer to that question is this: It depends on the industry (e.g., incidents of\u00a0<a href=\"https:\/\/www.osha.gov\/dsg\/hospitals\/workplace_violence.html\" target=\"_blank\" rel=\"noopener\">workplace violence in healthcare<\/a>\u00a0are far more common than in other industries) or the type of violent incident (e.g., non-fatal assaults have decreased while <a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2017\/06\/07\/453727.htm\" target=\"_blank\" rel=\"noopener\">workplace homicides<\/a> have increased).<\/p>\n<p>Regardless of whether WPV has decreased or increased, it&#8217;s clear that the issue needs addressing. The promotion and adherence to the \u201cIt wouldn\u2019t happen to us!\u201d <a href=\"http:\/\/www.safeathopkins.org\/workplace-violence\/myths-about-workplace-violence\/index.html\" target=\"_blank\" rel=\"noopener\">myth<\/a>\u00a0didn\u2019t save organizations from hackers breaching their systems, so why should it keep them from WPV incidents?<\/p>\n<hr \/>\n<p style=\"text-align: center;\"><em>Read: <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/04\/5-cybersecurity-questions-retailers-must-ask-protect-businesses\/\" target=\"_blank\" rel=\"noopener\">5 cybersecurity questions retailers must ask to protect their businesses<\/a><\/em><\/p>\n<hr \/>\n<h3>Types of WPV<\/h3>\n<p>Talking about workplace violence may conjure up highly-publicized images of active shooters stationed on campus. Let us keep in mind, however, that not all workplace violence events happen this way. According to Steve Crimando, an expert in the field of threat assessment and threat management, there are <a href=\"http:\/\/go.everbridge.com\/Violence-Prevention-and-Personal-Safety-for-Lone-Workers-and-Remote-Employees_Replay-Reg.html\" target=\"_blank\" rel=\"noopener\">five current types<\/a> we all need to familiarize ourselves with. They are:<\/p>\n<ul>\n<li><em>Criminal intent.\u00a0<\/em>This type usually involves criminals who target establishments, often, with the intent to steal. Robbers and shoplifters belong to this type.<\/li>\n<li><em>Customer\/Client<\/em>. This type is perpetrated by customers or patients (including their relatives) against one or more workers servicing them. Verbal abuse against workers in healthcare and social services is an example.<\/li>\n<li><em>Worker-to-worker.\u00a0<\/em>This is probably the type employees can relate to the most. These acts of violence can be perpetrated by either current or former employees toward one or more other employees of an organization. <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/11\/anti-bullying-week-of-weasels-snakes-and-queen-bees\/\" target=\"_blank\" rel=\"noopener\">Workplace bullying<\/a>\u00a0is an example of this type.<\/li>\n<li><em>Domestic violence.\u00a0<\/em>More commonly, women have been victims of domestic violence in the workplace, but that isn\u2019t to say that this doesn\u2019t happen to men.<\/li>\n<li><em>Ideological violence.\u00a0<\/em>This type could either be perpetrated by radicalized employees or external actors targeting organizations, its people, and properties for reasons related to their ideology, politics, or religion. Active shootings and terrorist attacks are examples that fall under this type.<\/li>\n<\/ul>\n<p>Some organizations only partially recognize stalking and cyberbullying as workplace violence, but we&#8217;d consider them to be as well.<\/p>\n<h3>Practical ways organizations can help address WPV<\/h3>\n<p>Marianne Alvarez, co-founder and director of training at the <a href=\"https:\/\/www.alicetraining.com\/\" target=\"_blank\" rel=\"noopener\">ALICE<\/a> (Alert, Lockdown, Inform, Counter, Evaluate) Training Institute in California, has provided tips on how organizations can prepare themselves for potential incidents of workplace violence. Her recommendations include:<\/p>\n<h4><strong>Assess<\/strong><\/h4>\n<p>Organizations must check the overall health of the organization\u2019s safety and physical security. This may involve hiring a certified risk assessment professional who can conduct a full onsite evaluation of security gaps or weaknesses the business may have to address. The risk assessment professional inspects infrastructure weaknesses (locks, CCTV cameras, etc.) and prevention and training programs that are in place to see if these need to be enhanced as well.<\/p>\n<h4><strong>Prioritize<\/strong><\/h4>\n<p>Once the risks and weaknesses are identified, the organization can then prioritize which ones to address first. During the prioritize phase, they should also set a plan and a budget.<\/p>\n<h4><strong>Train<\/strong><\/h4>\n<p>Organizations must continue training\u2014or in some cases, re-training\u2014their employees on how to how to respond to incidents of workplace violence, whether it be a full-blown shouting match between two workers or an incident involving aggressive intruders.<\/p>\n<p>It\u2019s imperative that companies stress the importance of preventing the escalation of a negative encounter in the workplace to an active shooting event.<\/p>\n<p>\u201cThe training should include a blended model of classroom-type learning, a test to ensure learning, and drills to practice what they learned,\u201d said Alvarez. \u201cMuch like CPR, one must be able to apply the appropriate concepts while under the pressure of a critical event. The only way to ensure this is to repeat the practice of the concepts in live drills.\u201d<\/p>\n<h3>When work life bleeds into personal life<\/h3>\n<p>Modern-day workers have come to perceive and accept their work lives as something inseparable from their personal lives. It\u2019s a mindset and lifestyle prevalent to those working in tech industry hotspots like Silicon Valley, as well as financial hubs such as Wall Street. So feeling like a failure in work could make one feel like a failure in life.<\/p>\n<p>\u201cAn employee can feel that they give their all to a company, making employment feel like less of a job and more a way of life,\u201d said Leslie Garcia, CEO of <a href=\"https:\/\/executechinc.com\/\" target=\"_blank\" rel=\"noopener\">Executech Security Solutions<\/a>. \u201cWhen not recognized for their efforts or terminated for poor work performance, this could possibly trigger a retaliatory emotional and potentially dangerous physical response.&#8221;<\/p>\n<p>It\u2019s vital to address vulnerabilities in systems that endanger valuable data. However, it is equally important to take care of the people under organizations&#8217; watch. Ideally, an overall workplace security posture\u2014that which covers the protection and safety of the business\u2019s infrastructure, tangible assets, digital assets, and its people\u2014coupled with <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/how-to-create-intentional-culture-of-security\/\" target=\"_blank\" rel=\"noopener\">a culture that intentionally ingrains security behaviors, awareness, and proper reporting practices<\/a>\u2014would be able to mitigate workplace violence as well.<\/p>\n<p>In the face of workplace violence, these are thoughts organizations must ponder, recognize, accept, and take action on. The lives of their employees depend on it.<\/p>\n<p>Recommended reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/eu.burlingtonfreepress.com\/story\/news\/local\/vermont\/2018\/07\/19\/fbi-lists-10-key-behaviors-active-shooters\/795574002\/\" target=\"_blank\" rel=\"noopener\">FBI releases new study: 10 key behaviors of active shooters<\/a><\/li>\n<li><a href=\"https:\/\/www.securitymagazine.com\/articles\/87754-do-no-harm-profiling-evil-and-violence-in-the-workplace\" target=\"_blank\" rel=\"noopener\">Do No Harm: profiling evil and violence in the workplace<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/10\/workplace-violence-the-forgotten-insider-threat\/\">Workplace violence: the forgotten insider threat<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/10\/workplace-violence-the-forgotten-insider-threat\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Fri, 12 Oct 2018 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2018\/10\/workplace-violence-the-forgotten-insider-threat\/' title='Workplace violence: the forgotten insider threat'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/shutterstock_1006208788.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Among insider threats, workplace violence could be considered the most dangerous. And yet, the majority of organizations are not prepared. What should they do to protect their employees?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/business\/\" rel=\"category tag\">Business<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/active-shooting\/\" rel=\"tag\">active shooting<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/alert\/\" rel=\"tag\">Alert<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/alice\/\" rel=\"tag\">ALICE<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/counter\/\" rel=\"tag\">Counter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/criminal-intent\/\" rel=\"tag\">Criminal intent<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/customer-client\/\" rel=\"tag\">Customer\/Client<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/evaluate\/\" rel=\"tag\">Evaluate<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/inform\/\" rel=\"tag\">Inform<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/insider-threats\/\" rel=\"tag\">insider threats<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lockdown\/\" rel=\"tag\">Lockdown<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ponemon-institute\/\" rel=\"tag\">Ponemon Institute<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/workplace-bullying\/\" rel=\"tag\">Workplace bullying<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/workplace-violence\/\" rel=\"tag\">workplace violence<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wpv\/\" rel=\"tag\">WPV<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2018\/10\/workplace-violence-the-forgotten-insider-threat\/' title='Workplace violence: the forgotten insider threat'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/10\/workplace-violence-the-forgotten-insider-threat\/\">Workplace violence: the forgotten insider threat<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,19847,19848,19849,1001,19850,19851,19852,19853,19854,14348,19855,19856,19857,19264,19858],"class_list":["post-13569","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-active-shooting","tag-alert","tag-alice","tag-business","tag-counter","tag-criminal-intent","tag-customer-client","tag-evaluate","tag-inform","tag-insider-threats","tag-lockdown","tag-ponemon-institute","tag-workplace-bullying","tag-workplace-violence","tag-wpv"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13569"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13569\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}