en

The Enemy Within: Top 5 Insider Cyber Threats for Companies in 2025

The Enemy Within: Top 5 Insider Cyber Threats for Companies in 2025
Cybersecurity News from Datami
Cybersecurity News from Datami Datami Newsroom
Jul 8, 2025 3 min

Company leaders often significantly underestimate insider cyber threats - yet it is employee actions, even unintentional ones, that can lead to catastrophic consequences.

According to various estimates, in 2024, between 68% and 95% of all data breaches were linked to human error. Let’s explore the main reasons why employees often become the weakest link in a company’s cybersecurity system.

1. Poor password practices

Studies show that 45% of passwords consist only of numbers or lowercase letters. According to Microsoft, nearly 100% of compromised accounts lacked multi-factor authentication. This carelessness and lack of security awareness make it easy for attackers to gain access.

What to do: Companies should conduct internal penetration testing, and users should be trained to create strong, unique passwords and avoid reusing them across services.

2. Phishing and social engineering

Employees frequently fall victim to phishing attacks: they open suspicious emails, click on malicious links, download infected files, or respond to attacker requests by providing sensitive information. For example, in 2024, an employee at a Hong Kong company transferred $25 million to hackers due to a phishing scam that used deepfake video impersonation.

What to do: Implement strong email filtering systems, enforce two-factor authentication across all corporate platforms, and conduct regular employee cybersecurity training.

Video call with a deepfake executive. A well-meaning employee ignores a red alert from the security system and prepares to transfer funds.

3. Use of personal devices

Employees often use unsecured personal devices for work tasks. In 2024, 83% of companies experienced at least one incident linked to personal gadget access. For instance, a Disney employee accidentally downloaded malware onto a personal computer, giving hackers access to their password manager. As a result, over 44 million internal Disney messages were stolen.

What to do: Companies should establish a clear BYOD (Bring Your Own Device) policy and enforce device management protocols.

4. Malicious actions by former employees

Former employees who retain access to company systems can cause significant damage, including intentional data deletion, theft of confidential information, or acts of sabotage.

What to do: Immediately revoke all access to corporate systems and databases upon any employee's departure, change all relevant passwords, and conduct regular penetration testing to detect lingering vulnerabilities.

5. Ignoring updates and patches

When employees fail to update software promptly, they leave company systems exposed to cyberattacks. Outdated software often contains known vulnerabilities that hackers can easily exploit. For example, in May 2021, Colonial Pipeline was attacked due to an outdated VPN lacking two-factor authentication, resulting in a multi-day fuel pipeline shutdown and a ransom payment of nearly $5 million.

What to do: Use automated update systems, provide ongoing employee training, and conduct regular vulnerability assessments to reduce exposure.

 

free_consultation

Fill out the form below, and we’ll get in touch with you right away to discuss a plan to protect your business!

Updated: 09.07.2025
(0 assessments, average 0/5.0)

Need stronger security?

We will help you identify vulnerabilities in your system.
Implement robust cybersecurity measures to protect your site. Write and get a free security assessment.

Related content

TOP 5 Largest Cryptocurrency Hacks in History Cybersecurity News from Datami
Cybersecurity News from Datami
TOP 5 Largest Cryptocurrency Hacks in History

The cryptocurrency industry is still in its formative stage, and its highly complex technologies are not always adequately protected. In addition, inexperienced users often make serious mistakes in securing their assets. This creates various opportunities

Jun 3, 2025 4 min
Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity Cybersecurity News from Datami
Cybersecurity News from Datami
Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity

Datami took part in the Barcelona Cybersecurity Congress 2025, one of Europe’s key events dedicated to cybersecurity innovations and technologies.

Jun 3, 2025
Dangerous Calendar: A New Tool for Phishing Attacks Cybersecurity News from Datami
Cybersecurity News from Datami
Dangerous Calendar: A New Tool for Phishing Attacks

Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.

Sep 2, 2025 3 min
Top 10 Cyberattacks That Brought Global Corporations to a Halt Cybersecurity News from Datami
Cybersecurity News from Datami
Top 10 Cyberattacks That Brought Global Corporations to a Halt

Cyberattacks today pose a serious threat not only to individual users but also to global corporations. Criminals use increasingly sophisticated methods, causing companies billions in losses and disrupting the operation of critical systems.

Jun 17, 2025 3 min
Datami at MERGE Madrid and EBC 25 Cybersecurity News from Datami
Cybersecurity News from Datami
Datami at MERGE Madrid and EBC 25

The Datami team attended MERGE Madrid and the European Blockchain Convention 2025 to share their expertise and witness how Web3 is evolving. This year, the focus shifted toward real-world solutions – security, auditing, and transparent standards.

Nov 13, 2025 3 min
Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Cybersecurity News from Datami
Cybersecurity News from Datami
Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

Sep 5, 2025 2 min
Back to home page
Order a consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy