Insider Risk Management & Data Protection

    The 4 human risk personas sabotaging your cybersecurity

    How to outsmart negligent, malicious, targeted and compromised users before they trigger your next breach

    by Masha Sedova

    Key Points

    • There are four primary human risk personas: the negligent user, the malicious user, the targeted user, and the compromised user.
    • By learning the characteristics and risks associated with each persona, organizations can implement targeted remediation strategies that address the challenges from each group.
    • Each persona has specific characteristics and risks that allow organizations to implement targeted remediation strategies to address the unique challenges of each group.

    Understanding the human element in cybersecurity is essential for safeguarding organizations against potential threats. By identifying four key risky persona types — the negligent user, the malicious user, the targeted user, and the compromised user — organizations can tailor their security strategies to effectively address specific vulnerabilities. Each of these user types presents unique challenges and risks that must be managed to protect sensitive data and maintain a robust security posture.

    The four human risk personas

    1. The negligent user: Willing but not able

    Negligent users are often well-intentioned but lack the necessary skills or awareness to adhere to security protocols. They unintentionally violate policies, making mistakes that can lead to significant risks for the organization.

    Key characteristics:

    • Frequently fall for phishing attempts
    • Fail to complete security training
    • Use unauthorized tools or mishandle sensitive data

    Negligent users are the most common risk persona, accounting for a significant portion of security incidents. Their actions, although not malicious, can still lead to severe consequences for the organization.

    2. The malicious user: Able but not willing

    Malicious users knowingly violate security policies with harmful intent. These individuals understand the rules but choose to circumvent them for personal gain or revenge.

    Key characteristics:

    • Engage in data theft or sabotage
    • May be disgruntled employees or those with grievances
    • Often target sensitive information or intellectual property

    Malicious users can cause substantial damage to an organization, especially during times of organizational stress, such as layoffs or toxic work environments.

    3. The targeted user: Under attack but not breached

    Targeted users are individuals who are actively being targeted by external threat actors but have not yet been compromised. They often face sophisticated attacks, including phishing and social engineering.

    Key characteristics:

    • Receive a high volume of phishing emails
    • Are often in high-value positions, such as management
    • May experience increased attack frequency over time

    Organizations must implement robust security measures to protect targeted users, as they are often in the first line of defense against external threats.

    4. The compromised user: Successfully breached

    Compromised users have fallen victim to external attacks, resulting in unauthorized access to their accounts or systems. This user represents the most severe risk to an organization.

    Key characteristics:

    • Experience account takeovers or malware infections
    • May unknowingly facilitate further attacks
    • Often require immediate incident response

    The impact of compromised users can be devastating, leading to significant financial and reputational damage for the organization.

    The interplay between personas

    Users can transition between these persona states. For instance, a negligent user may become a malicious user if they become disgruntled, while a targeted user may become compromised if they fall victim to a phishing attack.  A negligent user who is being targeted is much more likely to ultimately become a compromised user. 

    Risk and severity

    Negligent users, while frequent, typically causes less damage than a malicious user or a compromised user. However, the potential for harm increases significantly when users transition from negligent to malicious or from targeted to compromised.

    Remediation strategies for negligent users

    Organizations should focus on traditional security awareness training and behavior modification techniques. Providing real-time feedback and escalating repeat offenses to management can help mitigate risks associated with negligent users.

    Remediation strategies for malicious users

    Addressing malicious users requires a different approach. Organizations should implement data loss prevention (DLP) measures and monitor data movement closely. Notifying employees of suspicious activities can deter malicious actions.

    Remediation strategies for targeted users

    Targeted users require enhanced protection, including stricter email controls and advanced threat detection measures. Understanding who is being targeted and the nature of the attacks is crucial for effective defense.

    Remediation strategies for compromised users

    For compromised users, incident response is critical. Organizations must have robust detection and response capabilities in place to address anomalous behavior and mitigate damage.

    Implementing targeted remediation strategies

    Understanding and managing the four human risk personas is vital for organizations aiming to strengthen their cybersecurity posture. By recognizing the characteristics and risks associated with each persona, organizations can implement targeted remediation strategies that address the unique challenges posed by each group.

    Investing in security awareness and training for negligent users, monitoring malicious activity, protecting targeted users, and having a robust incident response plan for compromised users are all essential components of a comprehensive cybersecurity strategy. By focusing on these areas, organizations can significantly reduce their overall risk and enhance their security resilience in an increasingly complex threat landscape.

    Subscribe to Cyber Resilience Insights for more articles like these

    Get all the latest news and cybersecurity industry analysis delivered right to your inbox

    Sign up successful

    Thank you for signing up to receive updates from our blog

    We will be in touch!

    Back to Top