Rise in malicious insider threat reports

March 2026 News & Events, Information Security


Leslie Nielsen.

Mimecast has released its 9th annual State of Human Risk Report, revealing that 46% of SA organisations reported an increase in malicious insider incidents over the past year, matching the 46% of SA organisations reporting a rise in negligent incidents for the first time. This parity marks a fundamental shift in enterprise security, where intentional employee betrayal rivals accidental mistakes as a primary security concern.

Organisations worldwide reporting increases in malicious insider concerns jumped nearly 10 percentage points over two years, from 33% in 2024 to 42% in 2026. The study of 2,500 IT security and IT decision-makers across nine countries also quantifies the financial toll: organisations experience an average of six insider-driven incidents per month at an estimated cost of $13,1 million per incident, while 66% expect insider-related data loss to increase over the next 12 months.

The study explored dozens of facets of securing human risk, and some of the other key findings from the worldwide study include:

• AI threat preparation lags despite inevitable attacks: 69% of security leaders say AI attacks against their organisation are inevitable within 12 months, yet 60% are not fully prepared.

• Critical coordination gap undermines defences: Just 28% of respondents coordinate security training with continuous monitoring. This critical coordination gap undermines defences, leaving people-focused and technology-focused initiatives disconnected.

• Expanding attack surface meets inadequate native security: As threats expand across email, collaboration platforms, and internal communications, 38% of organisations remain reliant solely on native security controls – tools that 64% of respondents acknowledge are not up to the task. 

• Governance failures create a regulatory time bomb: 91% face challenges maintaining governance and compliance over communications data, while 59% lack confidence in quickly locating data to meet regulatory or legal requirements.

"Insider risk has become one of the most consequential and underestimated threats facing organisations today, not just because of the data loss it causes, but because attackers are increasingly exploiting insiders as a deliberate entry point to bypass perimeter defences entirely," said Mimecast CISO, Leslie Nielsen. "The data shows both careless mistakes and deliberate actions driving incidents in equal measure. Rather than trying to manage human behaviour, organisations need adaptive controls that identify high-risk actions and adjust protections in real-time, creating friction when someone accesses data they should not, regardless of whether they have valid credentials. As AI makes it easier for insiders to exfiltrate data at scale, security must meet users at the point of risk."

AI: The accelerant

The attack surface is rapidly expanding as employees work across email, GenAI platforms, and collaboration tools, yet security strategies have failed to keep pace. Native security controls are falling short: 38% of SA organisations rely on them exclusively for collaboration tools, even as 62% admit these controls are insufficient against modern threats.

At the same time, AI is emerging as a force multiplier for both external attackers and malicious insiders. 60% of SA security leaders say AI attacks are inevitable within 12 months. Yet, worldwide, 60% of organisations are not fully prepared. Attackers use AI to recruit insiders, craft convincing social engineering attacks, and automate reconnaissance.

An overwhelming 92% of SA organisations face challenges maintaining governance and compliance over communications data, limiting their ability to detect, investigate, and respond to incidents effectively. Moreover, 52% of SA organisations also lack confidence in quickly locating data to meet regulatory or legal requirements – a regulatory time bomb as compliance requirements intensify.

Fragmented defences, coordinated threats

A dangerous irony undermines defence efforts: 55% of SA organisations find security tool integration too complicated, while attackers face no such constraints. Modern attack chains seamlessly combine CAPTCHA-protected phishing, embedded JavaScript, and legitimate remote management tools, exploiting the gaps between disconnected security controls.

Worldwide, only 28% of organisations combine both regular security awareness training and continuous monitoring. This means when a high-risk user is identified through behavioural analytics, that intelligence does not automatically trigger coordinated responses across access controls, data loss prevention, and monitoring systems.

However, those who successfully integrate are reporting dramatic benefits. In SA, organisations achieve faster threat remediation (56%), comprehensive visibility (47%), and improved compliance readiness (46%). The challenge is not whether integration delivers value; it is that most organisations remain constrained by tool sprawl, unable to correlate threats across email, collaboration platforms, and data repositories.

Coordinating for human risk

Organisations can no longer treat their communication channels, collaboration platforms, and employee behaviours as isolated security concerns, nor rely on native controls that were never designed to stop human-targeted attacks at scale. Addressing human risk means meeting people where they are, in their inboxes, their workflows, and their daily decisions, with a holistic strategy that spans the full threat landscape.

The solution requires coordinated action across four dimensions:

1. Integrated visibility across all communication and collaboration channels.

2. Behavioural analytics and security behaviour management that identify high-risk users and anomalous activity patterns, while driving measurable change in how employees respond to threats.

3. Data governance and protection that safeguards sensitive information regardless of where it resides or how it moves.

4. Coordinated response that connects people-focused and technology-focused security controls.

Organisations that address these requirements will detect and prevent insider threats before costly breaches occur. Those that maintain fragmented approaches will see security spending rise, while protection effectiveness declines.

Download the 2026 State of Human Risk Report




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
From the editor's desk: When the rules change
Technews Publishing News & Events
         Welcome to the SMART Surveillance & AI Handbook 2026. We were a bit nervous about including AI in the title, since it either has a good or bad reputation depending on the individual – very few people ...

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.