The accessibility of insider threats on a corporate network