The Risks of Polywork: Digital Recruitment and Insider Threats
None
<p><a href="https://nisos.com/">Nisos</a><br> <a href="https://nisos.com/blog/risks-of-polywork/">The Risks of Polywork: Digital Recruitment and Insider Threats</a></p><div class="et_pb_section et_pb_section_0 et_pb_with_background et_section_regular"> <div class="et_pb_row et_pb_row_0"> <div class="et_pb_column et_pb_column_4_4 et_pb_column_0 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_module et_pb_text et_pb_text_0 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Blog</h2> </div></div> </div> <div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> </div> </div><div class="et_pb_section et_pb_section_1 et_section_regular"> <div class="et_pb_row et_pb_row_1"> <div class="et_pb_column et_pb_column_4_4 et_pb_column_1 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_module et_pb_text et_pb_text_1 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h1>The Risks of Polywork:<br> How Digital Recruitment Fuels Insider Threats</h1> </div></div> <div class="et_pb_module et_pb_post_title et_pb_post_title_0 et_pb_bg_layout_light et_pb_text_align_left"> <div class="et_pb_title_container"></div> </div> </div> </div> <div class="et_pb_row et_pb_row_2 et_pb_gutters2"> <div class="et_pb_column et_pb_column_4_4 et_pb_column_2 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_module et_pb_text et_pb_text_2 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner">Not long ago, the idea of someone holding two full-time jobs at once sounded like an outlier. Now, in the age of remote work, gig culture, and fluid job markets, it’s becoming the norm for some employees, and a costly risk for the organizations employing them. This “polywork” trend, where individuals simultaneously hold overlapping roles (often in competing or adjacent companies), has shifted from rare misconduct to a recurring reality in insider threat cases. <p>From a security perspective, polywork isn’t a lifestyle choice. It’s a breach of trust and, in many organizations, a clear violation of policy. It’s also a signal pointing to deeper insider threat exposure: data leakage, divided loyalties, intellectual property theft, and compliance failures. Left undetected, it creates blind spots that traditional insider threat programs aren’t always equipped to address.</p></div> </div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_3 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Why Polywork is Increasing and is an Insider Risk</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_4 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>Several forces have converged to make polywork more possible – and more tempting. <a href="https://nisos.com/blog/insider-threats-remote-work/">Remote work</a> has removed physical oversight, while digital recruitment platforms have normalized rapid role changes and made secondary opportunities easier to secure. At the same time, remote recruitment and hiring practices makes it easier for individuals to avoid detection. Economic pressures and the rising cost of living push some employees to seek additional income. In many sectors, the same specialized skills are in high demand across competing companies, making it easier for an employee to juggle or conceal overlapping roles.</p> <p>Some polyworkers disclose their outside engagements and seek approval, but many do not. When the second role overlaps in industry, technology stack, or access to sensitive information, th70e risks of polywork multiply. In these cases, the problem isn’t just that an employee is working two jobs. It’s that they’re working for you and your competition at the same time.</p> </div></div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_5 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>The Security Risks of Polywork</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_6 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>The most obvious risk of polywork is the direct transfer of intellectual property. An engineer developing proprietary code for one employer may reuse or “reference” it in another role. A sales executive with access to client pipelines may bring that information to a competitor. Even without malicious intent, the duplication of work product or sharing of insider knowledge between roles can cross legal and compliance boundaries.</p> <p>Polywork also makes insider-risk detection more complex. When the same user credentials are accessing sensitive systems at irregular hours, is it a sign of dedication? Burnout? Or that they’re serving another employer’s needs on your time? Without external context, those signals can be easy to misinterpret or dismiss until the damage is done.</p> <p>Because many polyworkers are skilled professionals operating under the radar, their activity may not trigger alerts designed to catch negligence or obvious exfiltration. As a result, internal logs may look normal, even while an employee is divided in loyalty and focus.</p> </div></div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_7 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>The Rise of DPRK Polyworkers</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_8 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>Polywork isn’t just a workplace trend – it’s also a tactic being exploited by sophisticated state-sponsored threat actors. One of the most concerning developments is <a href="https://nisos.com/research/dprk-it-worker-scam/">the rise of DPRK IT workers</a> posing as legitimate remote employees, often holding multiple jobs under false identities across startups and tech firms in the U.S. and abroad.</p> <p>Not all polywork is malicious, but when it’s used by<a href="https://nisos.com/dprk-it-worker-fraud-research/"> DPRK threat actors</a>, the stakes are far higher. This is polywork weaponized. In many cases, these DPRK threat actors hold multiple roles simultaneously, and have the potential to exfiltrate code, client data, or proprietary models while funneling earnings and intelligence back to a state-backed regime.</p> <p>This isn’t about making ends meet – it’s about strategic infiltration. While some employees take on second jobs for financial survival, DPRK-linked polyworkers operate with clear, malicious intent. They exploit the same hiring systems and digital recruitment platforms that legitimate job seekers use , but their motives are geopolitical -putting your trusted workforce and business at risk.</p> </div></div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_9 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Why Internal Monitoring Alone Miss Polywork Risk Signals</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_10 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>Undetected polywork can ripple far beyond the insider threat team. Product roadmaps can be exposed before launch. Customer relationships can be jeopardized by competing offers built from your own CRM data. Regulatory exposure grows if sensitive information crosses borders in the hands of a dual-employed insider.</p> <p>Polywork detection often requires seeing beyond the network perimeter. Internal tools can flag anomalies in system use, file access, or login patterns, but they can’t tell you why those patterns exist. The missing piece is external visibility. Identifying secondary affiliations, online profiles, and digital recruitment activity that indicate an employee’s professional commitments extend beyond your organization.</p> <p>Attribution and early risk detection are areas where Nisos has deep expertise. Our team of experts combine investigative tradecraft with external intelligence collection to connect signals that internal telemetry alone cannot explain. By complementing the internal telemetry that your tools capture with activity outside your walls, Nisos helps identify the signs of polywork early and deliver the clear evidence security teams need to act with confidence.</p> <p>When detection lags, your organization is left reacting after the fact. Prevention, in this context, is not just cheaper; it’s strategic risk management.</p> </div></div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_11 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Detecting Polywork with the <a href="https://nisos.com/platform/ascend/">Ascend™</a> Advantage</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_12 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>The launch of <a href="https://nisos.com/services/insider-threat-intelligence-solutions/">the Ascend™ Insider Threat Intelligence module</a> makes scaling your insider threat efforts easier than ever. <a href="https://nisos.com/platform/ascend/">Ascend</a> integrates seamlessly with your existing insider threat program, bringing the same outside-the-firewall visibility that has long defined Nisos investigations directly into your operational workflow.</p> <p>For security teams, this means being able to:</p> <ul> <li>Detect indicators of dual employment earlier, before sensitive data is compromised.</li> <li>Reduce blind spots by linking internal anomalies to external intelligence with confidence.</li> <li>Run more proactive insider threat operations, backed by expert attribution when cases require deeper investigation.</li> </ul> <p>Instead of guessing at intent, security leaders gain clear, actionable evidence that allows them to act decisively. That can mean escalating to HR, engaging legal, or shutting down access.</p> <p><a href="https://nisos.com/platform/ascend/">Learn more about how Nisos Ascend Insider Threat Intelligence Module helps organizations detect and prevent the risks of polywork before they become full-scale insider incidents >>></a></p> </div></div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_13 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>The Future of Insider Threat Programs in the Age of Polywork</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_14 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner">As remote and hybrid work persist, and as digital recruitment keeps the talent market fluid, insider threat teams will need to treat polywork as a core investigative scenario. That means building playbooks, refining detection criteria, and ensuring that internal monitoring is paired with external intelligence that can reveal risky behavior beyond your organization’s firewalls. <p>With Nisos’s Ascend Insider Threat Intelligence module, organizations can finally combine the early-warning advantages of Nisos’ investigative methodology with a platform that delivers continuous visibility. That combination gives insider threat leaders the ability to anticipate risk, not just respond to it.</p> <p>Strengthening insider threat programs today means fewer surprises tomorrow and better resilience against the evolving risks of polywork.</p></div> </div> <div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_15 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Proactive Defense Against Polywork</h2> </div></div> <div class="et_pb_module et_pb_text et_pb_text_16 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <p>Polywork is one of many modern insider threats demanding visibility beyond the network perimeter.</p> <p>With the Ascend Insider Threat Intelligence module, Nisos helps security teams detect internal risks before they escalate, reduce blind spots, and run more proactive insider threat operations.</p> <p><a href="https://nisos.com/contact/">Contact Nisos</a> to learn more about our Insider Threat solutions.</p> </div></div> </div> </div> <div class="et_pb_row et_pb_row_3"> <div class="et_pb_column et_pb_column_4_4 et_pb_column_3 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_module et_pb_text et_pb_text_17 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2>Frequently Asked Questions (FAQs) on the Risks of Polywork</h2> </div></div> <div class="et_pb_module dsm_faq dsm_faq_0"> <div class="et_pb_module_inner"> <div class="dsm-faq-container dsm-front" data-accordion="off" data-open_first_item="on"> <div class="dsm_faq_child_0 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">What does “polywork” mean in the context of insider risk?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">Polywork refers to employees holding more than one full-time job, often across competing or adjacent organizations. While sometimes harmless, it is a security risk and becomes an insider threat when individuals share sensitive data, intellectual property, or confidential strategies outside of the company.</div> </div> <div class="dsm_faq_child_1 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">What are the main business risks of polywork?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">The main risks of polywork include data leakage, divided loyalties, insider threats, and compliance violations. Even unintentional overlaps can expose confidential information and weaken enterprise security. </div> </div> <div class="dsm_faq_child_2 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">Why is polywork considered an insider threat?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">Polywork is an insider threat because employees may use access from one job to benefit another organization, or increase the likelihood of sharing sensitive company information externally. This creates blind spots that internal monitoring often misses.</div> </div> <div class="dsm_faq_child_3 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">How can companies detect polywork risk?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">Companies can detect polywork risk by combining internal monitoring with external intelligence. This helps link system anomalies to outside employment, recruitment profiles, or online activity that reveal multiple roles.</div> </div> <div class="dsm_faq_child_4 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">What is the DPRK polyworker threat?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">DPRK polyworkers are state-sponsored actors posing as legitimate remote employees. They take multiple roles under false identities to fund North Korean operations and are often in a position to steal data, exfiltrate code, and share sensitive company information. </div> </div> <div class="dsm_faq_child_5 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">How can Nisos help reduce the risks of polywork?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">Nisos helps organizations detect the risks of polywork through the Ascend™ Insider Threat Intelligence module. It helps detect indicators of dual employment earlier, before sensitive data is compromised. Reduce blind spots by linking internal anomalies to external intelligence with confidence. And run more proactive insider threat operations, backed by expert attribution when cases require deeper investigation.</div> </div> <div class="dsm_faq_child_6 dsm-faq-item-wrapper"> <div class="dsm-title-wrapper"> <div class="dsm-title-inner-wrapper"> <div class="dsm_open_icon"><span>K</span></div> <div class="dsm_close_icon"><span>L</span></div> <h4 class="dsm-faq-title">How can organizations prevent insider threats?</h4> </div> <div class="dsm-faq-item-inner-wrapper"></div> </div> <div class="dsm-faq-content">Prevention starts with proactive visibility. Combining HR policies with continuous monitoring, and external intelligence to help identify dual employment early and reduce polywork-related insider risks.</div> </div> </div> <p> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","name":"What does \u201cpolywork\u201d mean in the context of insider risk?","acceptedAnswer":{"@type":"Answer","text":"Polywork refers to employees holding more than one full-time job, often across competing or adjacent organizations. While sometimes harmless, it is a security risk and becomes an insider threat when individuals share sensitive data, intellectual property, or confidential strategies outside of the company."}},{"@type":"Question","name":"What are the main business risks of polywork?","acceptedAnswer":{"@type":"Answer","text":"The main risks of polywork include data leakage, divided loyalties, insider threats, and compliance violations. Even unintentional overlaps can expose confidential information and weaken enterprise security. "}},{"@type":"Question","name":"Why is polywork considered an insider threat?","acceptedAnswer":{"@type":"Answer","text":"Polywork is an insider threat because employees may use access from one job to benefit another organization, or increase the likelihood of sharing sensitive company information externally. This creates blind spots that internal monitoring often misses."}},{"@type":"Question","name":"How can companies detect polywork risk?","acceptedAnswer":{"@type":"Answer","text":"Companies can detect polywork risk by combining internal monitoring with external intelligence. This helps link system anomalies to outside employment, recruitment profiles, or online activity that reveal multiple roles."}},{"@type":"Question","name":"What is the DPRK polyworker threat?","acceptedAnswer":{"@type":"Answer","text":"DPRK polyworkers are state-sponsored actors posing as legitimate remote employees. They take multiple roles under false identities to fund North Korean operations and are often in a position to steal data, exfiltrate code, and share sensitive company information. "}},{"@type":"Question","name":"How can Nisos help reduce the risks of polywork?","acceptedAnswer":{"@type":"Answer","text":"Nisos helps organizations detect the risks of polywork through the Ascend\u2122 Insider Threat Intelligence module. It helps detect indicators of dual employment earlier, before sensitive data is compromised. Reduce blind spots by linking internal anomalies to external intelligence with confidence. And run more proactive insider threat operations, backed by expert attribution when cases require deeper investigation."}},{"@type":"Question","name":"How can organizations prevent insider threats?","acceptedAnswer":{"@type":"Answer","text":"Prevention starts with proactive visibility. Combining HR policies with continuous monitoring, and external intelligence to help identify dual employment early and reduce polywork-related insider risks."}}]}</script></p></div> </div> </div> </div> <div class="et_pb_row et_pb_row_4"> <div class="et_pb_column et_pb_column_4_4 et_pb_column_4 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_module et_pb_text et_pb_text_18 et_pb_text_align_left et_pb_bg_layout_light"> <div class="et_pb_text_inner"> <h2><strong>About Nisos®</strong></h2> <p>Nisos is a trusted digital investigations partner specializing in unmasking human risk. We operate as an extension of security, risk, legal, people strategy, and trust and safety teams to protect their people and their business. Our open source intelligence services help enterprise teams mitigate risk, make critical decisions, and impose real world consequences. For more information, visit: <a href="https://nisos.com./">https://nisos.com.</a></p> </div></div> </div> </div> </div><div class="et_pb_section et_pb_section_2 et_pb_with_background et_section_regular"> <div class="et_pb_row et_pb_row_5 et_pb_gutters2"> <div class="et_pb_column et_pb_column_1_2 et_pb_column_5 et_pb_css_mix_blend_mode_passthrough"> <div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module "> <a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://nisos.com/services/insider-threat-intelligence-solutions/">Insider Threat Intelligence</a> </div> </div> <div class="et_pb_column et_pb_column_1_2 et_pb_column_6 et_pb_css_mix_blend_mode_passthrough et-last-child"> <div class="et_pb_button_module_wrapper et_pb_button_1_wrapper et_pb_button_alignment_center et_pb_module "> <a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://nisos.com/platform/ascend/">Ascend™ Platform</a> </div> </div> </div> </div><p>The post <a href="https://nisos.com/blog/risks-of-polywork/">The Risks of Polywork: Digital Recruitment and Insider Threats</a> appeared first on <a href="https://nisos.com/">Nisos</a> by <a href="https://nisos.com/author/nisosauthor/">Nisos</a></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/10/the-risks-of-polywork-digital-recruitment-and-insider-threats/" data-a2a-title="The Risks of Polywork: Digital Recruitment and Insider Threats"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fthe-risks-of-polywork-digital-recruitment-and-insider-threats%2F&linkname=The%20Risks%20of%20Polywork%3A%20Digital%20Recruitment%20and%20Insider%20Threats" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fthe-risks-of-polywork-digital-recruitment-and-insider-threats%2F&linkname=The%20Risks%20of%20Polywork%3A%20Digital%20Recruitment%20and%20Insider%20Threats" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fthe-risks-of-polywork-digital-recruitment-and-insider-threats%2F&linkname=The%20Risks%20of%20Polywork%3A%20Digital%20Recruitment%20and%20Insider%20Threats" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fthe-risks-of-polywork-digital-recruitment-and-insider-threats%2F&linkname=The%20Risks%20of%20Polywork%3A%20Digital%20Recruitment%20and%20Insider%20Threats" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F10%2Fthe-risks-of-polywork-digital-recruitment-and-insider-threats%2F&linkname=The%20Risks%20of%20Polywork%3A%20Digital%20Recruitment%20and%20Insider%20Threats" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://nisos.com/">Nisos</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Nisos">Nisos</a>. Read the original post at: <a href="https://nisos.com/blog/risks-of-polywork/">https://nisos.com/blog/risks-of-polywork/</a> </p>