Sequentur Named to Inc.’s 2023 Power Partner List
user profile front side with white background

The Dangers Within: Understanding Insider Threats

In this article, we’ll discuss all aspects of insider threats including the motivations behind them, potential actors, their primary targets, consequences, and some ways you and a managed IT service provider can work together to minimize the risks to your business.

Managed IT Services

Proven Reliability. IT Excellence. 

The Dangers Within: Understanding Insider Threats


The year 2020 witnessed an unprecedented onslaught of cybersecurity threats across the world as the global workforce underwent a forced transition to remote work. The unfortunate reality is that not all cybersecurity threats come from outside an organization.

In a study conducted in 2020 by Bitglass (a major cloud security company), 61% of businesses surveyed reported at least one insider-related cybersecurity incident in the last year. Incidents could be caused by anything from negligent employees who lack cybersecurity training to rogue employees who facilitate a breach for personal gain.

Considering the increasing frequency of insider threats and the severity of data breaches resulting from them, it goes without saying that all organizations and their managed service providers need to take proactive steps to combat this serious security risk.

When taking any preventative security measures, it is necessary to understand who causes these risks and why.

In this article, we’ll discuss all aspects of insider threats including the motivations behind them, potential actors, their primary targets, consequences, and some ways you and a managed IT service provider can work together to minimize the risks to your business.


Actors Behind Insider Threats

Anyone with access to critical information can pose a potential insider threat if the information is unknowingly or maliciously misused, resulting in a data breach.

Businesses need to identify these actors if they want to curb insider threats effectively.

Insider threat types and a few of the methods IT companies use to fight them are as follows.

Negligent Insiders

This may include careless executives or employees with access to privileged information. These insiders don’t have any motivation – money or otherwise. They are simply careless in their actions or may have fallen victim to a scam.

For instance, in one incident involving an apparel manufacturer, a careless employee clicking one phishing link from his laptop was enough to compromise the entire network.

As negligence in this field often stems primarily from ignorance, an IT service provider can help combat this threat by providing a quality cybersecurity training program for all your staff, helping you foster a culture of security awareness in your company.

Malicious Insiders

These are insiders who intentionally abuse their credentials for personal gain.

These actors have an advantage over external attackers since they have access to privileged information and are aware of the security loopholes. They may be motivated by monetary gain or may have a personal vendetta against the company.

To minimize this threat, your IT MSP deploys a suite of advanced cybersecurity software.

They will also monitor your system and act as an extra layer of vigilance against anomalous activity. If any suspicious activity is detected, it can be reported and investigated, at times before the malicious breach even occurs.

Contractors or Vendors

Sometimes third-party vendors and contractors who have temporary access to an organization’s premises or IT network can cause a data breach.

The motivation in this case could also be money or vengeance.

The US Army Reserves payroll system was once targeted in a similar attack, where a contractor who lost his contract activated a logic bomb to create a delay in delivering paychecks.

As this is a hybrid inside/outside threat, Managed IT Service companies must employ a multi-prong approach combining aspects of the previous types.

Staff must be trained in methods to prevent contractors/vendors from accessing data they are not authorized to, and IT support must maintain a vigilant watch on the network to ensure any unauthorized use is detected and foiled as quickly as possible.


Motivations Behind Malicious Insider Threats

Malicious insiders are usually motivated by one or more of the following reasons.

Money or Greed

Most cases of non-negligent insider threats are motivated by money and personal financial gain. A greedy insider with access to restricted information is most often the culprit in this case.

For example, two employees of General Electric stole the company’s intellectual property regarding calibrating turbines and started a competing firm with this information. After years of investigation, they were convicted in 2020.


Another familiar reason for insider threats involves revenge. Disgruntled employees, who believe they have been wronged by the company they once worked for, are usually behind this type of threat.

In August 2020, a disgruntled former employee of Cisco deleted hundreds of virtual machines and caused about $1.4 million in damages to the company.


Many large organizations across the world have been victims of economic espionage from competing firms. This is mainly done to gain a competitive advantage in the market.

A state-owned Chinese enterprise perpetrated espionage against American semi-conductor firm Micron by sending compromised insiders and stole valuable trade secrets.

Strategic Advantage

Intellectual property theft against large corporations is most often a result of trying to gain a strategic advantage in the market.

Korean smartphone giant Samsung became a victim recently when its blueprint for bendable screen technology was stolen by its supplier.

Political or ideological

There have been many documented cases of insider threats motivated by political or ideological factors. These cases often concern national pride or revenge against another nation as reasons for the attack.


Why Insider Threats Are Dangerous

Insider threats often have a massive impact on your data, primary assets, and bottom line.

On top of it all, these threats are often hard to detect and contain. A study by the Ponemon Institute estimates that it takes 77 days on average to contain insider threats once detected.

  • Targets primary assets: Insider threats often target the primary assets of an organization including proprietary information, product information, business plans, company funds, IT systems and more.
  • Results in huge costs: The same study by the Ponemon Institute estimated that the average cost of insider threats has increased 31% to $11.45 million in the last two years. These costs include downtime losses, loss of business transactions, loss of business opportunities and more.


Don’t Wait to Protect Your Business

Although the consequences of insider threats may be disastrous, you don’t have to face this problem alone.

If you are wondering how you can mitigate these threats and prevent losses, as experts in the field of business IT, IT Support, and Managed IT Services, we’ve got you covered.

Reach out to us today to understand the different ways by which we can work together to build a resilient cybersecurity posture against insider threats at your company.

Get in touch with us today and let’s get started.




Data Sources:

Bitglass: 2020 Insider Threat Report

ZDNet: How one hacked laptop led to an entire network being compromised

The Register: IT plonker stuffed ‘destructive’ logic bomb into US Army servers in contract revenge attack

FBI – News: Investigation Into Theft of Intellectual Property from GE Leads to Two Guilty Pleas

Bankinfosecurity: Ex-Cisco Engineer Pleads Guilty in Insider Threat Case

US Department of Justice: PRC State-Owned Company, Taiwan Company, and Three Individuals Charged With Economic Espionage

cnn Business: Samsung’s folding screen tech has been stolen and sold to China

IBM Cost of Insider Threats: Global Report 2020

See More Relevant Posts

user profile front side with white background

3 Types of Network Attacks to Watch Out For

Here are some common attack vectors plaguing the industry when it comes to network infrastructure. It does not really matter the infrastructure type you have. If there is value to the data you are transferring within, someone wants to get it.

Read More ⟶
user profile front side with white background

5 Backup Mistakes to Avoid

In the current environment we’re living in, not having proper backups is just unthinkable! Here are 5 mistakes to avoid when thinking about this vital area of your business.

Read More ⟶

Contact Us

    Scroll to Top