During routine maintenance you find a wireless router connected to the network that wasn’t installed by the IT department. After doing some investigation, you discover that the router was installed by an employee so he could use his laptop wirelessly around his office. This is what type of threat actor?
Insider threat
Unskilled attacker
Shadow IT
Organized crime