Best practices toward mitigating data loss is to protect information at its source. Security technologies help mitigate the insider threat by monitoring and analyzing data access patterns in order to alert on those anomalous activities that fall outside accepted norms.
It must be remembered that insiders are human beings, and as such, their thoughts and activities are constantly changing and altering. Therefore, security practitioners must always think dynamically when it comes to trying to develop solutions to counter this threat. Implementing technology solutions at different levels and overlapping functions will best cast a tight-weave security net to catch suspicious behavior prior to a major security incident.
Source: CSO Australia
Sign up for CIO Asia eNewsletters.