The Sales Department had not been fulfilling a plan for three months. The reasons were unobvious: it was a business season, and there were no issues with the discipline and skills of the employees, but the number of deals has decreased.
Soon, the risk management department detected a suspicious message of a lawyer to an unknown addressee on Telegram: “I am ready to provide new clients but we need to reconsider my profit”. As it turned out, the recently employed lawyer was a stepson of the Sales Department Head. When his stepmother used to bring home her corporate laptop, he would download client databases and price lists, and leak information to the competitors receiving remuneration. And the competitors lured clients.
After that, the company set up a security policy to detect family ties. And the analysis of the data captured earlier helped to find the correspondence of the Sales Department Head. In this correspondence, she and her husband communicated on the topic of the employment of their son.
One of the internal threats which often remain undetected, or are just hard to disclose, is nepotism. Comprehensive monitoring allows your company to avoid favoritism toward friends and families' members which can be detrimental to your corporate culture and lead to deficient assessment of merits. |
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!