The rapid advancement of technology has quickly transformed the world into living in the digital age, almost everything in day-to-day activities involve some use of the internet and networks and ushering in a larger need for strict security practices. These practices are not only meant to protect businesses from outside threats, but inside threats as well. With the amount of sensitive data stored on technological devices, companies must be prepared for devious actions from employees. Cyber technology has streamlined operations and made significant improvements in productivity; however, it has also provided employees with more access to sensitive information and critical infrastructure than we’ve ever seen before. Even with the strictest of cybersecurity policies in place, it is hard to know if/when a disgruntled employee would decide to leverage their access to these materials. While data theft is a large concern, other smaller factors can prove to be just as detrimental to a company. For instance, employees bringing their own devices and connecting to networks could allow for unauthorized access or breaches even if the employee isn’t directly involved. Employees can also fall victim to outside attack attempts by accident, giving reason for keeping employees trained well and often. With the way the economy is currently worldwide, opportunities for employees to leverage their access to sensitive data for monetary reward are ever more concerning. Employers must be diligent in updating security protocols and limiting access to sensitive data to a need-to-know basis only. Organizations must all be diligent in revoking access to employees who no longer require access for their jobs or due to separation. Companies must now carry the burden of protecting its data from outside attackers and potential insider attacks from employees due to the high volume of sensitive data that is stored on servers.