Course Content
Knowledge check & certification
0/1
Cybersecurity 101

🧩
Module 3 · Lesson 3.3
Insider threat risks
Insider threats don’t always look like “hackers.” They often look like normal access used in risky ways — on purpose, by mistake, or through a compromised account.
Always watching. Always protecting.

🏢
What is an insider threat?

An insider threat is a security risk that comes from within the organization — someone who already has legitimate access.

This includes employees, contractors, vendors, temporary staff, and even former employees if access wasn’t removed properly.

Why it matters: Insider activity can blend in because the access is real — that’s what makes it harder to detect.

🧠
Types of insider threats
  • Malicious insider: intentionally causes harm (steals data, sabotages systems, shares access on purpose).
  • Negligent insider: creates risk through mistakes (clicks phishing, sends data to the wrong person, uses weak passwords).
  • Compromised insider: a real user account taken over by an attacker (stolen credentials, malware, MFA prompt abuse).
Important: Many insider incidents are accidental — good habits prevent most of them.

⚠️
Why insider threats are dangerous
  • They can look like normal work activity.
  • Insiders know processes, tools, and where sensitive data lives.
  • Damage can be fast: data loss, outages, legal exposure, and reputational harm.

🚩
Warning signs to watch for

Not every red flag means malicious intent — but patterns matter. Report concerns through the proper channel.

  • Accessing data unrelated to job duties
  • Large or unusual downloads/uploads
  • Repeated policy or security control bypass attempts
  • Sudden changes in behavior (anger, secrecy, disengagement)
  • Working unusual hours without a clear reason
Do not investigate on your own. Capture what you observed and report it to IT/Security using your approved process.

🛡️
How to reduce insider risk
  1. Use least privilege: only access what you need for your role.
  2. Protect credentials: never share passwords, use MFA, and lock your workstation.
  3. Verify before sending: confirm recipients and attachments before sharing sensitive info.
  4. Secure devices: log out when finished and keep company devices protected.
  5. Report early: small issues caught early prevent major incidents.

💬
Quick scenario
A team member who rarely works with customer data starts downloading large customer lists “for a project,” and asks you to share files through a personal email because “their company inbox is full.”
Correct response: Don’t share data through personal channels. Follow company-approved sharing methods and report the unusual request/activity to IT/Security.

Knowledge check (True/False)
True or False: Most insider threats are intentional attacks.
Answer: False. Many insider incidents are caused by negligence or simple mistakes — which is why safe habits matter.

Key takeaway

Insider threats are about trust + access. Keep access tight, protect credentials, use approved channels, and report anything unusual early.

When in doubt: Pause. Verify. Report.

Always watching. Always protecting.