In number of government and private case studies include that the insiders are threat to the organizations as they knowingly participate in cyberattacks have broad range of motivations , financial gain ,revenge , desire for recognition and power response to blackmail , loyality to others in the organizations .organizations must balance the need to access the information for conducting business with protecting this information from unauthorised access and to the secret information is considered as an external threat and it is also malicious threat to organization and that comes from people within the organization such as employees , former employees , contractors and bussiness associates . there are types of insider threats as threats occur for various reasons in some cases individuals use their access to sensitive information for personal or financial gain and they join the third parties such as other organizations or hacking groups and operate on their behalf to gain access from within the network of trust and share a sensitive information and another type of insider threat is referred to as logic bomb and in this harmful software is left running on computer systems by former employe and which cause the problems to complete disaster . insider threats can be intentional or unintentional and this term can be referred to individual who gain insider access using false information but who is not a true employee or an officer of the organization . Insider threats are very difficult to detect , identify and block the outside attacks consider a former employee using an unauthorized login and it wont raise the same security flag as an outsider attempts to gain the access to company secret information or compny network and for this reason insider threats are not detected before access is granted or damage is done . there are many more factors that make insider threats more difficult to detect as for one many individuals with authorized access are also aware of certain security measures which they must find a way to avoid detection and insider threats dont have to get around firewalls or other network based security measures as they work within the network and finally many organizations simply lack the visibility into users access and data activity ie required to sufficiently detect and defend against the insider threats and these are not only present in bussiness organizations but these threats are present in mordern security program so this is the reason why insiders are considered as threat to the organizations. Solution In number of government and private case studies include that the insiders are threat to the organizations as they knowingly participate in cyberattacks have broad range of motivations , financial gain ,revenge , desire for recognition and power response to blackmail , loyality to others in the organizations .organizations must balance the need to access the information for conducting business with protecting this information from u.