To ensure the security of a company's infrastructure from insider threats, strong hashing functions should be implemented in cloud structures to prevent collisions and weak prone hashing algorithms. Additionally, mobile internet should be secured as it accounts for 44% of reported incidents, with technical failures and system failures being the root cause of attacks. Human errors are also a significant factor, accounting for 2.6 million user connections affected by cyber attacks.