Resilience through awareness: Rethinking insider threats

Written by Robert Hope

September 25, 2025

3 minute read

When people think of cyber threats, they often picture hostile hackers. However, some of the most serious risks come from inside the organisation itself.

When people think of cyber threats, they often picture hostile hackers. However, some of the most serious risks come from inside the organisation itself. Known as insider threats, they’re one of today’s most pressing security challenges. According to Cybersecurity Insiders, 83% of organisations experienced at least one insider attack in the past year, while Verizon research indicates 29% of breaches for EMEA organisations originate from the inside.

As I explained in a recent discussion, insider threats aren’t just about IT systems – they’re security risks that originate from within an organisation. That’s why security and risk mitigation must be top of mind both inside and outside of work, as well as a keen awareness into the tools and solutions that make it possible.

Insider threats generally fall into three categories:

  • Malicious intent arises when individuals deliberately try to damage the company or profit from sensitive information. IBM research shows these breaches are the most expensive, averaging $4.92 million per incident.
  • Negligence stems from people not treating security with the respect it deserves. It’s vital that everyone takes a positive, always-on attitude towards security, as you can’t afford to not think about it today.
  • Credential compromise occurs through weak password hygiene, reusing the same password across personal and work accounts, or failing to store credentials securely.

And it’s not just employees: contractors, partners, or anyone with access to systems can become an insider threat.

Insider threats are a challenge for everyone

It’s easy to think of insider threats as just an IT problem. However, line managers and leadership teams play a critical role in prevention by setting the tone for responsible digital practices. By treating security as everyone’s responsibility, organisations can take the first, crucial step toward creating meaningful resilience.

Changing attitudes towards security

Security isn’t something that starts and ends at the office door. As Fujitsu experts often remind us, the most powerful defence layer is people. That means fostering a culture where employees view cybersecurity as part of daily life – from spotting phishing attempts at work to enabling security features on personal devices at home. When security awareness becomes second nature, organisations are better protected.

Informed people and proper tools are the real defence layer

From multi-factor authentication and passkeys to secure password managers, modern tools are essential for adding vital layers of defence. Despite this, no tool is foolproof, and a careless click on a phishing email can sometimes bypass even the most advanced systems. This is why the strongest safeguard for any organisation will always be informed, vigilant people – supported by the right tools.

The future of UK defence is a whole-society approach

The UK Government’s Strategic Defence Review 2025 calls for a whole-of-society approach to security, recognising that defence is not just the domain of specialists. Businesses, government and individuals must work together to build national resilience in the face of today’s shifting threat environment. At Fujitsu, we share this vision, empowering organisations and their people to take proactive steps against insider risk.

Four practical steps to strengthen resilience

  • Create strong, unique passwords and store them securely
  • Turn on Multi-Factor Authentication wherever it’s offered
  • Keep engaged through regular security training
  • Stay up to date with evolving tools and risks

At Fujitsu, we actively champion a ‘Secure by Design’ approach that builds security into every layer of an organisation’s technology, people and culture.

Please share this article to help raise awareness with your colleagues or contact us to reflect on your own security habits and discuss any thoughts you have about insider threats.

More blogs

Sovereignty at stake: why trusted digital infrastructure is a strategic necessity

In an era of geopolitical volatility, sovereign digital infrastructure is critical to enabling trusted defence collaboration and operational readiness.

Accelerating naval readiness through digital transformation

Speed in defence starts with people. Fujitsu is helping the Royal Navy to transform training through accessible, adaptive digital innovation.

The Future of Defence: intelligence, scalability and operational advantage

During conflict, speed and intelligence are everything. GlobeRanger empowers forces to connect, track, and predict asset readiness, ensuring operational success.

More blogs

Sovereignty at stake: why trusted digital infrastructure is a strategic necessity

In an era of geopolitical volatility, sovereign digital infrastructure is critical to enabling trusted defence collaboration and operational readiness.

Accelerating naval readiness through digital transformation

Speed in defence starts with people. Fujitsu is helping the Royal Navy to transform training through accessible, adaptive digital innovation.

The Future of Defence: intelligence, scalability and operational advantage

During conflict, speed and intelligence are everything. GlobeRanger empowers forces to connect, track, and predict asset readiness, ensuring operational success.