WYSE Travel Confederation
Insider threats – managing people as a security risk
WYSE News | July 11, 2025

Because it’s not always the hackers you need to worry about.

When most people think of cyber threats, they picture shadowy figures in basements, furiously typing to break into your systems. But here’s a reality check: some of the biggest threats to your business are already inside your building – or at least on your payroll.

Insider threats aren’t about evil geniuses in disguise. They’re about people – trusted employees, contractors, or partners – who, either intentionally or accidentally, put your business at risk.

Who counts as an insider threat?

Anyone who has access to your systems, data, or facilities can be a potential risk. That includes:

  • Current staff (yes, even the nice ones)
  • Former employees who still have login details
  • Contractors and freelancers
  • Third-party suppliers with remote access

Most insider threats aren’t malicious. They’re just mistakes – clicking the wrong link, storing data insecurely, or reusing passwords. But intentional threats do happen too – disgruntled staff, fraudsters, or even people bribed by competitors.

Example of insider risks

  • Accidental: An employee sends sensitive data to the wrong email address.
  • Negligent: Someone stores files on a personal cloud account “for convenience.”
  • Malicious: A departing staff member downloads your client list before handing in their laptop.
  • Compromised: A staff member’s login is stolen and used by attackers.

How to protect your business from the inside out

    1. Limit access
      Ask: “Does everyone only have access to what they actually need?”
      The fewer people who see or change sensitive data, the smaller your risk.

 

    1. Remove access immediately
      Ask: “What’s our offboarding process when someone leaves?”
      Delayed access removal is one of the most common ( and most fixable) risks.

 

    1. Train your people
      Ask: “Do staff know what a suspicious request looks like – and how to report it?”
      Human error is your biggest vulnerability – and your best defence. 

 

    1. Monitor activity
      Ask: “Do we have visibility over unusual login or data access behaviour?
      You don’t need to spy – just set alerts for anything out of the ordinary.

 

    1. Encourage reporting
      Ask: “Do people feel safe reporting mistakes or suspicious behaviour?”
      Shame and silence are dangerous. Culture matters.

 

In short…

People are your most valuable asset, and also your biggest wildcard. Managing insider threats isn’t about paranoia. It’s about visibility, access control, and building a culture where security is everyone’s business.

Because your firewall won’t help if the breach walks in through the front door with a lanyard and a smile.

We are pleased to offer WYSE Travel Confederation members these options to increase your cybersecurity and protect your organisation’s data.