Insider Threats in Cybersecurity: The Stats Every Leader Needs to See Insider Threats in Cybersecurity: The Stats Every Leader Needs to See Posted on 14 August 2025 Related Topics Read our blog on Data Loss Protection More on IT Security and Compliance Download our eBook on Cybersecurity More about Blue Saffron Get In Touch Insider threats in cybersecurity aren’t rare edge cases. For UK recruitment firms, accountancy practices, and HR/people consultancies, they’re the uncomfortable norm: busy, trusted colleagues working across email, ATS/CRM, payroll and shared drives—where one slip (or one shortcut) can spill client data. The latest Verizon DBIR 2025 confirms it: the human element hovers around 60% of breaches, and third-party involvement doubled from 15% to 30%, reflecting our reliance on SaaS and suppliers. Table of Contents 1. Why Insider Threats Matter in Cybersecurity 2. Real UK Examples of Insider Threats 3. Types of Insider Threats 4. Top Insider Risk Hotspots to Fix 5. 90-Day Insider Risk Reduction Plan 6. What Good Looks Like 7. Leader’s Insider Threat Checklist 8. How Blue Saffron Can Help 9. Frequently Asked Questions (FAQs) 1. Why this matters to recruitment and professional services You process high-value personal data at scale. CVs, right-to-work documents, payroll details, ledgers—prime targets for criminals and data brokers. Email still runs the business. The ICO’s public dashboard shows misdirected email remains a top reported incident type—simple, frequent, and reputationally painful. ICO. Your vendors expand your attack surface. DBIR’s third-party signal is a wake-up call for ATS/HRIS, e-signature and payroll ecosystems. Verizon. Bottom line: This isn’t just an IT risk. It’s a client-trust and revenue risk. And it’s largely preventable with the right guardrails. 2. Real UK examples (not hypotheticals) Recruiting software: 26 million CVs exposed (July 2025). A misconfigured Azure Blob at TalentHook left nearly 26M resumes publicly accessible—an “easy mistake” that’s far too common in the recruitment supply chain. If your agency shares data with vendors, this is your risk too. IT ProCybernews Accountancy discipline for client-data exfiltration (2024). The ICAEW sanctioned accountant Julia Manley for taking 62 client records to a personal device—some of those clients later moved with her. Professional sanctions often start with “just copying a file.” AccountingWEB Off-channel comms in finance (2025). An FCA survey of 11 UK wholesale banks found 178 breaches of internal rules on WhatsApp/Signal—41% involved senior staff. The FCA isn’t planning sweeping new rules, but scrutiny is active and firms are expected to fix governance gaps. FN London+1 MoD ARAP email incident—national headlines, human stakes (2021–2025). An email sent with cc instead of bcc exposed Afghan applicants to each other; the ICO fined the MoD £350k and in July 2025 the government launched an ex-gratia payment scheme for those affected. One email workflow error became a multi-year crisis. ICOGOV.UK These aren’t scare stories; they’re a mirror. Different sectors, same pattern: insiders + everyday tools + pressure. 3. Two kinds of insider risk (both fixable) Negligent insiders (most common) People in a hurry misaddress emails, attach the wrong file, or upload to personal clouds “just this once.” DBIR’s “human element” captures how often social engineering and credential misuse flow from ordinary behaviour—not supervillains. Verizon Malicious insiders (less frequent, more damaging) Departing staff exfiltrate candidate lists or ledgers to win business elsewhere. The ICAEW case shows real professional consequences—and how quickly trust can evaporate. AccountingWEB 4. The three hotspots to fix this quarter 1) Misdirected email & attachment sprawl What goes wrong: Autocomplete picks the wrong “John.” Sensitive packs go as attachments rather than controlled links.Fixes that work: Turn on external-recipient prompts and sensitive-content tips (Microsoft 365/Google Workspace). Make secure links the default (expiry, watermarking, no forwarding); encrypt when needed. Track a single KPI: % of external sends as secure links.The ICO’s trends make clear this one workflow is a persistent driver—so it’s the highest-ROI place to start. ICO 2) Shadow channels & off-policy messaging What goes wrong: Client chats in WhatsApp/Signal because “that’s what they use.” You lose retention and audit trails.Fixes that work: Publish a one-page, plain-English approved comms policy (who may use what, when). Offer friction-free, mobile-ready alternatives (e.g., Teams shared channels/guest access). Instrument supervision for regulated roles. Measure off-policy incidents per quarter and fix the root causes (often “speed” or “mobile access”).Recent FCA work shows this is as much governance as technology. FN LondonFCA 3) Third-party & mass-export exposure (ATS/CRM/payroll) What goes wrong: Bulk CV exports, broad API tokens, contractors retaining access.Fixes that work: Disable mass download/export by default; require approval for bulk actions. Enforce MFA and least privilege across vendors; rotate keys quarterly. Add exfiltration alerts for unusual export size/time/IP. Run a monthly high-risk access review for shared mailboxes, admin roles and tokens.DBIR’s third-party findings make this a board-level control, not a nice-to-have. Verizon 5. A 90-day plan (measurable, low-friction) Days 1–30: Guardrails Switch to link-by-default for external file sharing; enable recipient/domain prompts; tune DLP for NI numbers, passport data, payroll identifiers. Company-wide MFA (prefer phishing-resistant) and impossible-travel alerts. “Shadow-channel amnesty” week: capture what teams use and why; publish the approved list and easy alternatives. Days 31–60: Access & vendor hygiene Role-based access review across ATS/CRM/payroll; remove “everyone” shares; clean stale groups. Vendor attestation pack: MFA, logging, export controls, breach SLAs, retention. Leaver automation to revoke shares, apps and tokens same-day. Days 61–90: Rehearse & report Run a no-blame misdirected-email drill and a departing-consultant exfiltration scenario. Publish a simple dashboard: time-to-report, time-to-contain, % emails sent as links, # off-policy comms. Repeat monthly, celebrate improvements publicly. 6. What “good” looks like (before → after) RecruitmentBefore: Consultants export 500 CVs to Excel and email attachments to clients.After: Shortlists shared as expiring, access-controlled links; bulk export disabled; DLP blocks NI/passport patterns in email.(Relevance: the 26M-CV TalentHook exposure shows the cost of misconfigured sharing.) IT Pro AccountancyBefore: Payroll files are sent to client distribution lists; junior staff inherit broad folder access.After: Least-privilege by client; payroll via secure portal links; leaver automation revokes tokens and shared drives the same day.(Relevance: the ICAEW disciplinary case underlines ethics and GDPR risk.) AccountingWEB HR/People consultingBefore: Sensitive investigations discussed in WhatsApp; files land in personal clouds for “convenience.”After: Sanctioned channels with retention and legal hold; device posture checks; no personal cloud for client data.(Relevance: UK regulators are actively reviewing off-channel comms controls.) FCA 6. Leader’s five questions for this week 1. Email: What % of external sends are attachments vs. links? Who’s accountable for moving that number? 2. Exports: Where have we disabled bulk export across ATS/CRM/payroll? Can any single user still download “everything”? 3. Comms: Which clients insist on WhatsApp? What’s our approved alternative (and why is it easier)? FN London 4. Vendors: Which third parties hold admin/API access into our systems, and when were those roles last reviewed? Verizon 5. Culture: How do staff report mistakes without fear? Are time-to-report and time-to-contain improving? 6. How Blue Saffron can help (without slowing the business) Blue Saffron partners with UK SMEs to reduce insider risk by fixing everyday workflows—not by adding red tape. Insider-Risk Readiness Review (2–3 weeks) mapped to DBIR 2025 and ICO trends, focused on email/ATS/CRM/payroll flows and quick wins. VerizonICO Email & Data Guardrails (recipient prompts, link-by-default, DLP for CV/RTW/payroll patterns) with success measured by % links vs attachments. Culture-first enablement (micro-lessons, no-blame drills, leadership dashboards). Vendor uplift (MFA, logging, export controls, breach SLAs, monthly high-risk access reviews). Explore our approach at Blue Saffron and browse our blog for related guides. If you want the broader perspective, see your earlier overview on insider-driven data loss and then link readers through to this sector-specific playbook. 7. Frequently Asked Questions (FAQs) What are insider threats in cybersecurity?They’re security risks that come from within your organisation, such as employees, contractors, or suppliers with access to systems and data. These risks can be intentional or accidental, but both can lead to serious breaches. Are they always intentional?No. Most insider threats are unintentional, caused by mistakes like sending files to the wrong recipient, using personal email for work, or storing data in unsanctioned cloud apps. These accidents can still break GDPR and harm client trust. Why are recruitment, accountancy, and HR at higher risk?These sectors process large amounts of personal and financial data and rely on multiple platforms like ATS, payroll, and CRM systems. This creates more points where data can be mishandled or stolen. How can I prevent insider threats?Start with practical controls like email recipient prompts, secure link sharing instead of attachments, company-wide MFA, and regular access reviews. Pair these with a no-blame reporting culture so staff feel safe reporting mistakes quickly. Ready to cut insider risk without slowing your team down? Blue Saffron helps recruitment, accountancy, and HR firms put smart, practical safeguards in place — from preventing misaddressed emails to blocking unauthorised data exports. Contact us today and protect your clients, your reputation, and your bottom line.