{"id":414,"date":"2017-05-30T16:09:52","date_gmt":"2017-05-30T16:09:52","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/3-types-of-employees-that-can-cause-a-data-breach\/"},"modified":"2019-05-29T12:02:16","modified_gmt":"2019-05-29T12:02:16","slug":"3-types-of-employees-that-can-cause-a-data-breach","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/","title":{"rendered":"3 types of employees that can cause a data breach"},"content":{"rendered":"<p class=\"wls-paragraph\">When it comes to cybercrime, it\u2019s easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat.<\/p>\n<p class=\"wls-paragraph\">Indeed, a <a href=\"https:\/\/haystax.com\/blog\/ebook\/insider-attacks-industry-survey\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent report<\/a> by Haystax Technology discovered that 74% of organizations questioned \u201cfeel vulnerable to insider threats,\u201d with 56% of security professionals certain that \u201cinsider threats have become more frequent\u201d over the past year.<\/p>\n<p class=\"wls-paragraph\">While some attacks and breaches are caused by employees with a grudge, many also occur due to negligence \u2013 perhaps ignoring a warning; failing to follow procedure \u2013 or simple human error. We have identified three types of employees that can cause a data breach. Read on.<\/p>\n<h2><strong>1. Innocent actions<\/strong><\/h2>\n<p class=\"wls-paragraph\">When it comes to breach of data, innocent workers can cause as much damage as malicious hackers; a lesson learned by <a href=\"https:\/\/www.welivesecurity.com\/2015\/07\/01\/eastern-england-councils-slew-data-breach-errors\/\" target=\"_blank\" rel=\"noopener noreferrer\">local authorities<\/a> in Norfolk, Suffolk and Cambridgeshire, UK, which recorded over 160 data breaches between 2014 and 2015, the majority due to human error (including mobile phones being lost, letters being misaddressed and even a filing cabinet containing sensitive data being sold to a third party).<\/p>\n<p class=\"wls-paragraph\">Another example can be seen with the 2016 data breach at the American firm <a href=\"https:\/\/www.welivesecurity.com\/2016\/04\/26\/insider-threats-persistent-widespread-problem\/\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Deposit Insurance Corp. (FDIC)<\/a>. In this instance, an innocent former employee \u201cinadvertently and without malicious intent\u201d downloaded sensitive data onto a personal storage device.<\/p>\n<p class=\"wls-paragraph\">With cases like those above, it is hardly surprising that 74% of those surveyed by Haystax were most concerned about this type of inadvertent data breach.<\/p>\n<h2><strong>2. Careless or negligent?<\/strong><\/h2>\n<p class=\"wls-paragraph\">You know the security warning that flashes up on your screen \u2013 do you always take immediate action? A survey by <a href=\"https:\/\/www.welivesecurity.com\/2015\/04\/17\/will-people-always-ignore-security-warnings\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> in 2013 discovered that 25 million Chrome warnings were <a href=\"https:\/\/www.welivesecurity.com\/2014\/07\/15\/google-chrome-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">ignored by 70.2%<\/a> of the time partly due to users\u2019 lack of technical knowledge, which led to the tech giant simplifying language it uses for its warnings.<\/p>\n<p class=\"wls-paragraph\">Elsewhere, <a href=\"http:\/\/www.hipaajournal.com\/st-joseph-health-settles-class-action-data-breach-lawsuit-3354\/\" target=\"_blank\" rel=\"noopener noreferrer\">St. Joseph Health System<\/a> suffered a breach in 2012 in which security settings were \u201cmisconfigured,\u201d leading to private medical records being visible online. Due to the sensitive nature of the records it is perhaps unsurprising that the lawsuit which followed <a href=\"https:\/\/www.welivesecurity.com\/2016\/04\/13\/medical-data-breach-leads-record-cash-settlement\/\" target=\"_blank\" rel=\"noopener noreferrer\">cost the company millions of dollars<\/a>.<\/p>\n<h2><strong>3. Malicious<\/strong><\/h2>\n<p class=\"wls-paragraph\">Unfortunately, as well as human error, malicious actions by employees also play a part in insider data breaches. This is illustrated by the story of the UK\u2019s communications regulator OFCOM, which discovered in 2016 that a former employee had sneakily been <a href=\"https:\/\/www.welivesecurity.com\/2016\/03\/11\/ofcom-experiences-major-data-breach-thanks-former-employee\/\" target=\"_blank\" rel=\"noopener noreferrer\">gathering its third-party data<\/a>. Shockingly, the malicious activity had been taking place over a six-year period.<\/p>\n<p class=\"wls-paragraph\">UK supermarket giant Morrisons also reportedly fell foul of a disgruntled employee who <a href=\"https:\/\/www.welivesecurity.com\/2015\/07\/17\/huge-morrisons-data-breach-due-employee-grudge-court-hears\/\" target=\"_blank\" rel=\"noopener noreferrer\">posted the personal data of nearly 100,000 of its staff on the internet<\/a>. Although the incident occurred in 2014, the company is still facing the prospect of further <a href=\"http:\/\/www.theweek.co.uk\/64830\/morrisons-records-first-rise-in-profits-for-six-years\/page\/0\/4\" target=\"_blank\" rel=\"noopener noreferrer\">legal action by staff<\/a> over the breach.<\/p>\n<h2><strong>What can be done?<\/strong><\/h2>\n<p class=\"wls-paragraph\">According to a <a href=\"https:\/\/www.welivesecurity.com\/2016\/01\/14\/employees-face-penalties-misinterpreting-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">2016 survey<\/a>, 93% of respondents consider human behavior to be the greatest risk to data protection. Nuix, which commissioned the survey, believes that corporations may start reprimanding employees who \u201cmisunderstand, misinterpret, or miscalculate longstanding security policies and procedures\u201d.<\/p>\n<p class=\"wls-paragraph\">And with the impact of a data leak causing <a href=\"https:\/\/www.welivesecurity.com\/2016\/06\/10\/drip-flood-impact-data-leak\/\" target=\"_blank\" rel=\"noopener noreferrer\">damage to businesses<\/a>, including financial losses and the damage to a firm\u2019s reputation, it\u2019s unsurprising that companies are open to finding ways to mitigate and limit computer misuse.<\/p>\n<h4><strong>Increase employee awareness<\/strong><\/h4>\n<p class=\"wls-paragraph\">Perhaps the most logical step for employers is to ensure that all employees are aware of the potential impact of their actions, and how to avoid inadvertent data loss. It is also important to involve all employees in appropriate training, rather than simply those involved directly with IT.<\/p>\n<h4><strong>Keep information safe<\/strong><\/h4>\n<p class=\"wls-paragraph\">According to ESET\u2019s Stephen Cobb, \u201c<a href=\"https:\/\/www.welivesecurity.com\/2016\/06\/29\/digital-patch-kit-protect-data-leaks\/\" target=\"_blank\" rel=\"noopener noreferrer\">there are a million reasons to encrypt data<\/a>\u201d. While not embraced by all, encrypting data could be an important part of preventing data loss.<\/p>\n<h4><strong>Monitor data, and behaviours<\/strong><\/h4>\n<p class=\"wls-paragraph\">Keeping a close eye on computer use and the behaviours of individuals should enable businesses to remain aware of and identify unusual or risky activity. BOYD (bring your own device) schemes which operate in many companies should also be carefully monitored and controlled.<\/p>\n<h4><strong>Look to the future<\/strong><\/h4>\n<p class=\"wls-paragraph\">With the risk posed by employees \u2013 however innocent \u2013 potentially catastrophic to business, it is hardly surprising that employers seem set to take a <a href=\"https:\/\/www.welivesecurity.com\/2016\/01\/14\/employees-face-penalties-misinterpreting-security-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">much tougher approach<\/a> to insider security threats in future years.<\/p>\n<p class=\"wls-paragraph\">If you\u2019re looking to improve your workplace cybersecurity efforts, ESET\u2019s free <a href=\"https:\/\/www.eset.com\/us\/cybertraining\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity awareness training<\/a> resource is a great place to start.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/26\/3-types-employees-cause-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to cybercrime, it\u2019s easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. Indeed, a recent report by Haystax Technology discovered that 74% of organizations questioned \u201cfeel vulnerable to insider threats,\u201d with<\/p>\n","protected":false},"author":5,"featured_media":1813,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147],"tags":[],"class_list":["post-414","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>3 types of employees that can cause a data breach - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 types of employees that can cause a data breach\" \/>\n<meta property=\"og:description\" content=\"When it comes to cybercrime, it\u2019s easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. Indeed, a recent report by Haystax Technology discovered that 74% of organizations questioned \u201cfeel vulnerable to insider threats,\u201d with\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-30T16:09:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:02:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"3 types of employees that can cause a data breach\",\"datePublished\":\"2017-05-30T16:09:52+00:00\",\"dateModified\":\"2019-05-29T12:02:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/\"},\"wordCount\":735,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_588617792-623x410.jpg\",\"articleSection\":[\"cybercrime\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/\",\"name\":\"3 types of employees that can cause a data breach - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_588617792-623x410.jpg\",\"datePublished\":\"2017-05-30T16:09:52+00:00\",\"dateModified\":\"2019-05-29T12:02:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_588617792-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_588617792-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 types of employees that can cause a data breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/30\\\/3-types-of-employees-that-can-cause-a-data-breach\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"3 types of employees that can cause a data breach - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"3 types of employees that can cause a data breach","og_description":"When it comes to cybercrime, it\u2019s easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. Indeed, a recent report by Haystax Technology discovered that 74% of organizations questioned \u201cfeel vulnerable to insider threats,\u201d with","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-05-30T16:09:52+00:00","article_modified_time":"2019-05-29T12:02:16+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"3 types of employees that can cause a data breach","datePublished":"2017-05-30T16:09:52+00:00","dateModified":"2019-05-29T12:02:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/"},"wordCount":735,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg","articleSection":["cybercrime"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/","name":"3 types of employees that can cause a data breach - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg","datePublished":"2017-05-30T16:09:52+00:00","dateModified":"2019-05-29T12:02:16+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_588617792-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"3 types of employees that can cause a data breach"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/30\/3-types-of-employees-that-can-cause-a-data-breach\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/414","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=414"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/414\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1813"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=414"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=414"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=414"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}