{"id":25926,"date":"2024-09-23T08:30:56","date_gmt":"2024-09-23T15:30:56","guid":{"rendered":"https:\/\/cowbell.insure\/?p=25926"},"modified":"2025-11-13T07:25:08","modified_gmt":"2025-11-13T15:25:08","slug":"the-enemy-within-insider-threat-awareness","status":"publish","type":"post","link":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/","title":{"rendered":"The Enemy Within \u2013 Insider Threat Awareness"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">National Insider Threat Awareness Month (NITAM) is observed every September and is a collaboration between U.S. federal agencies and industry organisations to educate and emphasise the importance of detecting, deterring, and reporting insider threats. The goal is to raise awareness of the risks posed by \u2018insiders,\u2019 and provide strategies, tools, and resources to identify and mitigate these threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At Cowbell, we work with our agency partners and brokers to help educate our clients on emerging and evolving cyber risks and the enemy within can present a very real threat.\u00a0<\/span><\/p>\n<p><b>What is a Cyber Insider Threat?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation&#8217;s systems or data misuses that access for the organisation&#8217;s detriment. Insider threats can be intentional or unintentional, and they are the cause of most data breaches. Insider threat individuals are typically split into two types of actors:<\/span><\/p>\n<p><b>Malicious Insider Threat<\/b><span style=\"font-weight: 400;\"> (which falls into two categories).\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Employees who <\/span><b><i>actively turn<\/i><\/b><span style=\"font-weight: 400;\"> on their employer. These insider threats often act to gain financially or to cause harm to an organisation. However, they can also include whistleblowers, who serve to bring public attention to the failings of their employer.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Employees who <\/span><b><i>collaborate<\/i><\/b><span style=\"font-weight: 400;\"> with a cyber criminal and use their authorised access to steal sensitive data, such as customer information or intellectual property. They are typically financially motivated or reveal information to disrupt business operations.\u00a0<\/span><\/li>\n<\/ul>\n<p><b>Negligent Insider Threat<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Company employees who are <\/span><b><i>manipulated<\/i><\/b><span style=\"font-weight: 400;\"> into carrying out malicious activity, such as disclosing their user credentials or downloading malware. They are often targeted by attackers through social engineering or spear-phishing campaigns.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employees who believe that they are exempt from their organisation\u2019s security policies and <\/span><b><i>bypass <\/i><\/b><span style=\"font-weight: 400;\">them. Whether through convenience or incompetence, their actions result in data and resources going unsecured, which gives attackers easy access.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>Insider Threat Examples<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Although not all threats are intentional and may be caused by negligent or careless decisions, they still are considered to be insider threats because they come from within the organisation. Malicious attacks, on the other hand, are often carefully planned, executed, and concealed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some insider threat examples that involve a mix of malicious and accidental incidents:<\/span><\/p>\n<p><b>A Fired Employee Fires Back<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">In 2021, an employee at an undisclosed credit union, decided to exact revenge after being fired from their job. The IT team did not immediately deprovision her access to sensitive systems after termination. Within 40 minutes, the former employee deleted over 21GB of data that included 3,500 directories and 20,000 files. Some of the deleted files were anti-ransomware software and mortgage applications. The employee was also able to access board minutes and other sensitive information.<\/span><\/i><\/p>\n<p><b>An Insider Error Steers Data of Drivers into Hacker\u2019s Hands<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">An employee at a technology company stored the data of US drivers in an insecure offsite location, leaving it vulnerable to a breach. The accidental leak impacted 27.7 million records. Even though the breach did not involve either financial or social security data, the technology company still ended up covering the cost of incident response\u2014and it is facing a class-action lawsuit as a result.<\/span><\/i><\/p>\n<p><b>U.S. City Files Deleted Because of an Insider\u2019s Mistake<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">An employee of a large U.S. city was fired after it was discovered they had deleted more than 22TB of data between 2018 and 2021. Among the destroyed files were 13TB of videos, photos, and case notes that belonged to a Police Department. The investigation revealed that the incident was not a malicious attack. The employee simply failed to follow internal procedures while transferring files.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">As you can see, there are a wide variety of outcomes that can result from both malicious and non-malicious insider threat activity.<\/span><\/p>\n<p><b>How Do Cyber Insider Threats Usually Operate?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">When insiders attack, they sometimes need to hack security systems or set up hardware or software infrastructure to make it easier for them or others to access systems. Understanding insiders\u2019 tactics and tools can help businesses spot the attack and take steps to mitigate it. Below is a list of what to watch out for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Backdoors that enable access to data: To find backdoors, perform a backdoor file scan or monitor your system for external requests from hackers who may be trying to use the backdoor.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hardware or software that enables remote access: Look out for instances of remote access software, such as TeamViewer or AnyDesk, and check for physical servers installed around your campus, such as Synology devices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Changed passwords: Any time a user\u2019s old password does not work and they feel it may have been changed, check to see if this is true. It could have been an inside attacker changing it to enable them access to the resources that the user has rights to.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unauthorised changes to firewalls and antivirus tools: Any time the settings of a firewall or antivirus change, it could be the result of an inside attacker trying to pave an easy path to your system.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Malware: If you discover malware, it is best to investigate when and where it was installed. It could have been put there by an insider.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unauthorised software: When unauthorised software gets installed, this should always raise a red flag. In many cases, the software may look innocent, but it could be a Trojan horse virus, which contains hidden malware.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access attempts to servers or devices with sensitive data: Any time someone tries to access a sensitive area of your network, this could be an insider threat, particularly because you often need credentials issued by the organisation to do so.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Vigilance is critical and can often help prevent an attack before it\u2019s perpetrated.\u00a0<\/span><\/p>\n<p><b>How To Stop Insider Threats<\/b><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Detect<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organisations need to be able to detect malicious, suspicious, or unusual activity on their networks. Threat detection includes having real-time insight into user logins, such as where and when a user has logged in to the corporate network and the location they have accessed it from. Security solutions and rapid threat detection help organisations increase the visibility of their network, track employees\u2019 actions, and get alerts regarding anomalous activity.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Investigate<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once the suspicious activity has been detected, organisations need to be able to investigate it immediately. There is no use detecting suspicious activity but not investigating it until several days after the event, as the attacker will likely have escalated their privileges and carried out their attack.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Prevent<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When it has been determined that the suspicious activity is malicious or unauthorised, organisations need to prevent users from gaining access to their networks and systems. They need a threat prevention solution that blocks an attacker from gaining access to data and snooping on user activity. Organisations can also prevent insider threats by deploying virtual private networks (VPNs), which encrypt data and enable users to keep their browsing activity anonymous behind a VPN solution.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Protect<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organisations need to protect their users and devices by enforcing security policies and securing their data. Critical assets, such as facilities, people, technology, intellectual property, and customer data need to be protected at all times with the appropriate levels of access rights and privileges. Policies need to be clearly documented, and all employees must be familiar with the security procedures they need to follow, their data privileges, and their intellectual property rights. This final step of the process is crucial to complying with increasingly stringent data privacy regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Being proactive and understanding the unique risks associated with Insider Threats not only safeguards your organisation from potential security breaches, but also mitigates business interruptions, protects your reputation, and fosters a more secure and resilient digital ecosystem. In the end, that is the goal of National Insider Threat Awareness Month.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>National Insider Threat Awareness Month (NITAM) is observed every September and is a collaboration between U.S. federal agencies and industry organisations to educate and emphasise the importance of detecting, deterring, and reporting insider threats. The goal is to raise awareness of the risks posed by \u2018insiders,\u2019 and provide strategies, tools, and resources to identify and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":35397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[2024],"tags":[],"class_list":["post-25926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-risk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Enemy Within \u2013 Insider Threat Awareness - Cowbell UK<\/title>\n<meta name=\"description\" content=\"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation&#039;s systems or data misuses that access for the organisation&#039;s detriment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Enemy Within \u2013 Insider Threat Awareness\" \/>\n<meta property=\"og:description\" content=\"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation&#039;s systems or data misuses that access for the organisation&#039;s detriment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"Cowbell UK\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-23T15:30:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-13T15:25:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cowbell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cowbell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\"},\"author\":{\"name\":\"Cowbell\",\"@id\":\"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36\"},\"headline\":\"The Enemy Within \u2013 Insider Threat Awareness\",\"datePublished\":\"2024-09-23T15:30:56+00:00\",\"dateModified\":\"2025-11-13T15:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\"},\"wordCount\":1281,\"image\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png\",\"articleSection\":[\"Cyber Risk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\",\"url\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\",\"name\":\"The Enemy Within \u2013 Insider Threat Awareness - Cowbell UK\",\"isPartOf\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png\",\"datePublished\":\"2024-09-23T15:30:56+00:00\",\"dateModified\":\"2025-11-13T15:25:08+00:00\",\"author\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36\"},\"description\":\"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation's systems or data misuses that access for the organisation's detriment.\",\"breadcrumb\":{\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage\",\"url\":\"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png\",\"contentUrl\":\"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cowbell.insure\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Enemy Within \u2013 Insider Threat Awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cowbell.insure\/uk\/#website\",\"url\":\"https:\/\/cowbell.insure\/uk\/\",\"name\":\"Cowbell UK\",\"description\":\"The Sound Approach to Risk\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cowbell.insure\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36\",\"name\":\"Cowbell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png\",\"url\":\"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png\",\"contentUrl\":\"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png\",\"caption\":\"Cowbell\"},\"description\":\"Cowbell makes digital protection clear and connected\u2014turning complexity into confidence through technology, data, and human insight. Because real strength hums quietly beneath the surface.\",\"url\":\"https:\/\/cowbell.insure\/uk\/blog\/author\/cowbell-cyber\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Enemy Within \u2013 Insider Threat Awareness - Cowbell UK","description":"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation's systems or data misuses that access for the organisation's detriment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/","og_locale":"en_US","og_type":"article","og_title":"The Enemy Within \u2013 Insider Threat Awareness","og_description":"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation's systems or data misuses that access for the organisation's detriment.","og_url":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/","og_site_name":"Cowbell UK","article_published_time":"2024-09-23T15:30:56+00:00","article_modified_time":"2025-11-13T15:25:08+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png","type":"image\/png"}],"author":"Cowbell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cowbell","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#article","isPartOf":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/"},"author":{"name":"Cowbell","@id":"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36"},"headline":"The Enemy Within \u2013 Insider Threat Awareness","datePublished":"2024-09-23T15:30:56+00:00","dateModified":"2025-11-13T15:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/"},"wordCount":1281,"image":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png","articleSection":["Cyber Risk"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/","url":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/","name":"The Enemy Within \u2013 Insider Threat Awareness - Cowbell UK","isPartOf":{"@id":"https:\/\/cowbell.insure\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage"},"image":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png","datePublished":"2024-09-23T15:30:56+00:00","dateModified":"2025-11-13T15:25:08+00:00","author":{"@id":"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36"},"description":"A cyber insider threat is a cybersecurity risk that occurs when someone with legitimate access to an organisation's systems or data misuses that access for the organisation's detriment.","breadcrumb":{"@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#primaryimage","url":"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png","contentUrl":"https:\/\/cowbell.insure\/uk\/wp-content\/uploads\/sites\/13\/2024\/09\/2024-09-23-InsiderThreatAwareness-38.png","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/cowbell.insure\/uk\/blog\/the-enemy-within-insider-threat-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cowbell.insure\/uk\/"},{"@type":"ListItem","position":2,"name":"The Enemy Within \u2013 Insider Threat Awareness"}]},{"@type":"WebSite","@id":"https:\/\/cowbell.insure\/uk\/#website","url":"https:\/\/cowbell.insure\/uk\/","name":"Cowbell UK","description":"The Sound Approach to Risk","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cowbell.insure\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cowbell.insure\/uk\/#\/schema\/person\/7532eca876a52462e77fb1ed11ab8d36","name":"Cowbell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png","url":"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png","contentUrl":"https:\/\/cowbell.insure\/wp-content\/uploads\/2026\/04\/Cowbell-Avatar-96x96.png","caption":"Cowbell"},"description":"Cowbell makes digital protection clear and connected\u2014turning complexity into confidence through technology, data, and human insight. Because real strength hums quietly beneath the surface.","url":"https:\/\/cowbell.insure\/uk\/blog\/author\/cowbell-cyber\/"}]}},"_links":{"self":[{"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/posts\/25926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/comments?post=25926"}],"version-history":[{"count":4,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/posts\/25926\/revisions"}],"predecessor-version":[{"id":35398,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/posts\/25926\/revisions\/35398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/media\/35397"}],"wp:attachment":[{"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/media?parent=25926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/categories?post=25926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cowbell.insure\/uk\/wp-json\/wp\/v2\/tags?post=25926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}