Myth: Cybersecurity pros are always on your side.
Myth: Those who protect you cannot become the threat.
Key Takeaways:
Insider roles carry risk when oversight is lax
Even trusted negotiators or incident responders can misuse access
Strong internal controls are as vital as external defenses
In a dramatic betrayal of trust two cybersecurity professionals—one from DigitalMint and another from Sygnia—have been indicted for orchestrating BlackCat ransomware attacks on medical, pharmaceutical, engineering, and drone manufacturing firms. One Florida business paid $1.27 million after a $10 million demand. These aren’t distant risks—they are real consequences of assuming that “trusted” equals “safe.”
To protect your operations ensure your team implements:
• Role-based access audits
• Behavioural monitoring for privileged users
• Clear policies for recruitment, oversight, and separation of duties
Only then can you build a security stance that holds up not just to external threats but insider risk too.
Let’s make sure your security setup is actually airtight.
https://thecyberexpress.com/blackcat-ransomware-insiders-indicted/


