The research analysed cyber-crime across critical infrastructure sectors and found that nearly 100 per cent of insider IT sabotage was carried out by people who were 'disgruntled', 'paranoid' and/or 'argumentative'.
It went on to reveal that 86 per cent of saboteurs held technical positions, and 90 per cent had system administrator or privileged system access.
Some 40 per cent of those who sabotaged IT systems were employed at the time of the offence, but the majority of crimes were committed by ex-employees shortly after termination.
Around 64 per cent of incidents involved infiltration via virtual private networks using passwords that had not been cancelled, thereby taking advantage of poor security and gaps in their organisation's access controls.
Calum Macleod, European director at security firm Cyber-Ark, highlighted the dangers of companies being frivolous with 'power passwords' and noted how dangerous passwords can be if not properly managed.
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago