During routine maintenance you find a wireless router connected to the network that wasn’t installed by the IT department. After doing some investigation, you discover that the router was installed by an employee so he could use his laptop wirelessly around his office. This is what type of threat actor?
Unskilled attacker
Organized crime
Shadow IT
Insider threat