Insider attacks are very effective and often highly damaging, due to the fact that insiders reside within the trust domain of an
organization, they are not subject to many security controls that keep external attackers at bay, and they have valid credentials to access systems and services within the organization.