It is becoming common for organizations of any nature to be violated by data breaches. Breaches occur when an organization’s security infrastructure is penetrated and sensitive data is accessed. The malicious path individuals take to penetrate an organization’s data varies. Because of this variation, organizations must be open minded to different, evolving threats and be prepared for them.
These negligent or malicious individuals are given the name Insider Threats. An insider is any individual - contractor, employee, manager or CEO - that has access to sensitive company data, and they have the administrative rights to inflect changes on that data. An insider threat can steal, destroy or transfer data from an organization. They can take many different forms; which we will further explore in this paper.