Insider Threat

24th December 2019 | Cybrary Insider Threat
An Insider Threat is a person or group of persons within an organization who pose a potential risk of harm to a company. That harm can be in the form of a security breach, the theft of intellectual property, or even damage to a company’s brand through accidental exposure of sensitive information.  These threats can originate from employees, contractors, business partners, or even internal accounts that have been breached.  Insider threats are realized when an Internal threat actor(s) exploits their inside knowledge of or access to an entity’s security program, computer systems, services, products, facilities, or critical data and use that knowledge or access to cause harm. It is important to remember that not all insider threats are malicious. Some compromises occur due to insider accidents such as publishing a Website without appropriate content controls or permission restrictions leading to data being exposed accidentally to the Internet.
How big of a problem is Insider Threats?  The Statistics please…
In 2019, the Verizon Data Breach Incident Report (DBIR) reported that 28% of compromised networks were due to insider threats (comprised of malicious insiders and accidental errors).

What does this mean for your SMB?

SMBs are at risk of insider threats just like any other business with a large amount of critical and sensitive data.  The important message for an SMB is to train employees to watch for the signs of “strange behaviors” that some internal employees may display while committing crimes against your company.  Train your staff on insider threats and if they see something, train them to say something, to a manager or senior leader.  Additionally, employ these methods to reduce inside threat risks to your business, whether accidental or intentional (each term mentioned links to another CyberHoot cybrary cybersecurity definition): Related Term: Accidental Insider Threat, Malicious Insider Threat, Outsider Threat Source: CNSSI 4009; NIAC Final Report and Recommendations on the Insider Threat to Critical Infrastructure, 2008

If you would like more information on this topic, watch this short video:

https://www.youtube.com/watch?v=QXnNkSeT6dM

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!

Sign Up Today!
Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more