• Home
  • Services
    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us

Jazz Solutions, Inc. (JSL)  

  • solutions@jazzsol.com
Connect with JSL
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us
Linkedin
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
      • Cybersecurity Awareness Month
        • Cybersecurity Q&A with CISO Avery Moore
        • The cybersecurity work no one talks about but everyone depends on
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
    • Cybersecurity Awareness Month
  • Careers
  • Contact Us
Linkedin
Cyber in 60

Insider threats: The enemy you know

By JSL Staff 

While you’re busy fortifying your digital walls against hackers, the real threat could already be inside the building. Insider threats are like that trusted friend who knows where you hide your spare key—except sometimes they’re not so trustworthy. 

Here’s the reality check: 55% of security incidents come from your own people. And before you start side-eyeing your coworkers, most aren’t plotting against you—they’re just making expensive mistakes. 

Follow the Money 

The numbers are staggering. Organizations are hemorrhaging an average of $17.4 million annually from insider incidents. That’s not a typo. And the biggest culprit? Larry from accounting, who clicked that suspicious email link, not some mastermind spy. 

Quick cost breakdown: 

  • Negligent employees: $8.8M (ouch) 
  • Malicious insiders: $3.7M (double ouch) 
  • Employees who got outsmarted: $4.8M (triple ouch) 

It’s Not Just About Data Theft 

Think insider threats are just about stolen files? Think again. We’re talking about: 

  • Workplace violence (yes, really) 
  • Corporate espionage (like a bad spy movie) 
  • Sabotage (revenge of the disgruntled employee) 
  • Good old-fashioned theft (intellectual property is the new gold) 

Spot the Red Flags 

Your threat radar should ping when you notice: 

  • The Perpetual Complainer: Always griping about work, management, or life in general 
  • The Rule Bender: “Security policies are more like guidelines, right?” 
  • The Data Hoarder: Downloading files like they’re preparing for the digital apocalypse 
  • The Financial Stress Case: Money troubles or sudden mysterious wealth 
  • The Walking HR Violation: Threats, intimidation, or just generally making people uncomfortable 

Time Is Money (Lots of Money) 

Here’s a sobering fact: Organizations that contain incidents quickly spend $10.6M versus $18.7M for the slow responders. Speed matters—a lot. 

The Silver Lining 

Finally, some good news! Organizations are getting smarter: 

  • 81% now have insider threat programs (up from 77%) 
  • Detection times are actually improving for the first time ever 
  • Companies are doubling their security investments because math 

Your Action Plan 

See something weird? Say something. 

It’s that simple. Research shows 85% of potential threats leak their plans beforehand.  

Your coworkers aren’t mind readers, but they might be the early warning system that prevents the next headline-grabbing security disaster. 

Bottom line: Insider threats aren’t going away, but with the right awareness and quick action, you can turn your biggest vulnerability into your strongest defense. 

Remember: The best firewall is a workforce that that actually cares about security. 

 

Sources 

  • JSL Insider Threat Awareness Training. (2025). 2025 Insider Threat Awareness Training.  
  • Ponemon Institute & DTEX Systems. (2025). 2025 Cost of Insider Risks Global Report. 
  • National Counterintelligence and Security Center, National Insider Threat Task Force. (2024). Insider Threat Guide: A Compendium of Best Practices to Accompany the National Insider Threat Minimum Standards. 
  • Cybersecurity and Infrastructure Security Agency. (2020). Insider Threat Mitigation Guide.  

Five ways to keep staff awake during cybersecurity training
Previous Article