What it is
Insider threat is when someone who has inside knowledge of your business – like a current or former employee – uses their knowledge to undermine or attack your business.
Unfortunately you are viewing this website on an outdated browser which does not support the necessary features for us to provide an adequate experience.
Please switch to a modern browser such as latest version of Google Chrome, Mozilla Firefox, Apple Safari or Microsoft Edge.
People with inside knowledge of your business can use that knowledge to access your systems and cause issues for your business. Here's how to reduce this risk.
Insider threat is when someone who has inside knowledge of your business – like a current or former employee – uses their knowledge to undermine or attack your business.
Don’t use generic passwords and logins — have a unique
the details you use to get into an online account, often a username or email address and password a group of connected devices
If you manage your network on a
A term referring to services, software, or data that is online, rather than running on your device or stored on physical hard drives.
Make sure you back up your files regularly. This includes the files on your computers, phones and any other devices you have. You can:
The part of your device where all your data is kept.
Storing a website or other data so that it can be accessed over the internet.
Limit your employees’ access to the systems and processes they need to do their job and no more. This is known as the principle of least privilege.
Avoid access creep — as people move into different roles within your business, make sure that their access changes to match what they need in their new role. Remove access to anything they no longer need.
Have processes in place to ensure that when an employee leaves, their system logins and passwords are removed. If they have access to their emails from home, make sure that access is removed too.
Ensure that employees hand any devices, like iPads and phones, back when they leave, as well as any building passes they might have.
Make sure your staff know how to manage the risk of insider threat. Attackers will often use your employees to gain information and get access to your business.
Your employees might:
Current employees who pose a threat can also gather information through overheard conversations, or by shoulder surfing — watching over another employee’s shoulder to see login details or passwords.
They can use other employees’ details to access things that they shouldn’t, like the HR or payment system.
If you’ve been affected by insider threat, you should:
You can also report an online issue or security incident like this to us at CERT NZ.