"Traditional means are quite inadequate to prevent insider hacking," says Jonathan Klein, president of MicroStrategy. "Most networks rely on user names and passwords. Since user names and passwords are in many respects owner-anonymous, you can't ascertain who is using them, whether they've been hacked, stolen, phished, or compromised."
The problem is even more basic with corporations says Bidwell, with a lot of organizations not being fully aware of what it is they need to protect.
Companies need to do three things to understand their insider hacking risk. They "need to know what their assets are, where they are and who has access to them." Says Bridwell.
Read MoreCelebrity NudePhoto Hacking: Should You Be Worried?
"Many of these organizations don't even know what they have that other people might want. They don't know the value of it or they haven't taken the time to know the value of what they have, so they don't know the risks are and how to protect against them."
While not advocate of "big-brother style" surveillance, Bridwell points out that once a company ascertains it is in risk of an insider breach, it is in its interest to monitor these areas that pose the biggest risks.
"There is a certain level of corporate liability in making sure that corporate assets, such as laptops, phones, pads and other technology are monitored in ways that can tell if certain subtle patterns are being broken so as to alert manager to a future threat." Says Bridwell.
This story has been updated to reflect the full name and title of MicroStrategy's Jonathan Klein.
By Hamza Ali, special to CNBC.com, follow him at