Accedian is now part of Cisco  |

Avatar photo
By Michael Bacon

The Accedian Top 10: August, 2021

Companies are over investing in perimeter security, while they are getting blindsided by insider threats

Historically, the data breaches that make the headlines have been carried out by outsiders like rogue hackers or nation states.

Today, it’s the threats that originate from within that IT teams are finding so difficult to detect and prevent against.

  • Many companies have invested heavily in perimeter security
  • Unfortunately, they have failed to protect their company networks from insider threats
  • There can be enormous cost, risk and damage done to the business through insider threats, whether it be a disgruntled employee, malicious insider, careless user, and/or supplier

Insider threats and related incidents are costing organizations millions of dollars every year, with major breaches resulting in the leakage of sensitive customer and company data. This can result in a severe disruption of the business, irreparable damage to reputation, and even lawsuits.

In this week’s Top 10 it is all about insider threats.

Not subscribed to The Accedian Top 10 newsletter yet? Subscribe here and get these updates straight to your inbox every 2 weeks.


1. What is an insider threat?

Insider threats come from within the network and usually come from trusted parties, which means they are usually attacking in broad daylight.


2. Insider threat actors

Learn more about who the insider threat actors are in your network.


3. Motivations of insider threats

Understanding the motivations of insider threats can help you define mitigation strategies.


4. Insider threat statistics

The statistics are staggering as more and more threats go undetected in the network often cloaking malicious activity.


5. Even a small breach is big trouble

Companies that do not take proactive measures can suffer irreparable harm from even the smallest of insider threats.


6. Insider threats are increasing in cost and frequency

Hackers are shifting their attacks from the perimeter to inside the network, and businesses are painfully aware.


7. Protecting your organization from the inside out

Many organizations are trying to protect the perimeter, but an inside out model is a more proven strategy for insider threats.


8. Insider threats have only increased due to the surge of remote workers

Having the right solutions and strategies in place to defend against insider threats is critical as more and more remote employees are accessing the network.


9. Insider threats now targeting key infrastructure

Download the US National Counterintelligence and Security Center (NCSC) insider threat guide for US critical infrastructure.


10. Get Your SANS Report: Making Visibility Definable and Measurable

Shutting down insider threats means security managers need to define strategies and recommend investments in robust cybersecurity processes and controls. Learn how they’re doing it in this free SANS Report: Making Visibility Definable and Measurable.

Thanks for tuning in to this edition of the Top 10! Any requests for the next edition? Send me your thoughts at [email protected]!