How To Minimize Insider Threats In Cyber Security