# Insider Threat **MITRE ATTACK layer:** Collection / Exfiltration An insider threat is a security risk originating from within an organization such as employees, contractors, or partners who misuse their legitimate access to harm systems, steal data, or disrupt operations. ## How is Insider Threat abused Insiders abuse their authorized credentials and knowledge of security blind spots to exfiltrate sensitive data, impersonate trusted roles to gain elevated privileges, sabotage critical infrastructure, or collaborate with external attackers to bypass controls. ## Why Insider Threat matters Insider threats trigger data breaches, catastrophic financial losses, operational disruptions, erosion of customer trust, regulatory penalties, and compromise of high-value intellectual property that can evade traditional perimeter defenses and take years to recover. ## Real-world example ### In April 2025, a former Disney employee was charged after allegedly using retained system access to alter allergen information in menu-creation software, creating physical safety risks for restaurant patrons with food allergies. [Source](https://edition.cnn.com/2025/04/28/business/former-disney-employee-menu-sentenced) ## Related topics ### Shadow IT **Category:** Collection / Exfiltration [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/shadow-it.html) ### Privileged User Compromise **Category:** Collection / Exfiltration [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/privileged-user-compromise.html) ### Business Email Compromise **Category:** Collection / Exfiltration [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/business-email-compromise.html) ## Additional Resources ### Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report **Type:** Research See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report **Type:** Security validation Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies **Type:** Guide Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)