Cyber Insider

Most insider acts involve IT exploitation which is termed ‘Cyber Insider’.

Last Updated 08 December 2020

CPNI defines an insider as a person who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets for unauthorised purposes. These days, most insider acts involve IT exploitation termed “Cyber Insider”. CPNI has been engaging with industry and academia through a broad range of research initiatives that aim to improve IT monitoring capabilities to identify insider precursors and behaviour; raising awareness in employer and employee communities about insider threats; establish methods for designing IT and policies to deter staff from committing insider acts; designing IT and work practices to block insider acts.

See the video below on system sabotage - a common insider act involving exploitation of IT.

Further information on protecting against insider acts is available under Related Pages below, covering guidance on insider risk assessment.

Follow this link to visit the Legal Considerations for Employee IT Monitoring page.


Did you find this page useful? YesNo
Thank you for your feedback. If you have any further suggestions on how this information can be made even more useful to improve your experience, feel free to share details below.
Thank you for your feedback. Sorry to hear that you haven't found this information useful. Please help us improve your experience and share how we can make this information more useful for you.