SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
HowtoSpottheSixArchetypes
of Insider Exfiltration
The key to stopping insider exfiltration is recognizing the threat and learning to
identify the individuals most likely to steal sensitive data. Knowing which personae
to watch for could help an organization avoid a costly breach.
The Ship Jumper
is looking for or just accepted a new job.
WARNING SIGNS:
Frequent absences, unexplained disappearances or
unexpected medical appointments can be signs of a Ship
Jumper. Workers who have accepted a new job are the most
likely to give data to a competitor, especially in positions such
as sales, product development, and business intelligence.
BEHAVIORAL CLUES:
• Dissatisfaction with current position
• Negative attitude
• Talks trash about goings on at the company
The Unhappy Camper
may have received a poor performance review,
been passed over for promotion or been placed
on a performance improvement plan.
WARNING SIGNS:
Employee may be consistently out sick the day after receiving
news of poor performance or reprimand. He or she keeps
score and may show a propensity toward revenge or
vindictive behavior.
BEHAVIORAL CLUES:
• Negative affect
• “Out-to-get-me” attitude
• Quick to point the finger, blames others
• Poisons the well
The Spendthrift
is experiencing acute or chronic
financial problems.
WARNING SIGNS:
Employee talks excessively about money and how much
things cost in a negative light. He or she always seems to be in
a financial jam, may get calls from collection agencies at work
or talk about taking on a second job to increase cash flow.
BEHAVIORAL CLUES:
• Admission of financial problems
• Talking about needing to find a new source of income
• Lifestyle doesn’t match income level
• Borrowing money from coworkers
The Angler
is always working schemes to exploit
perceived weaknesses or vulnerabilities
in people and systems.
WARNING SIGNS:
The Angler is often a fast talker who brags about working or
gaming the system at work and/or in his or her personal life.
He or she has no qualms with breaking the rules or cutting
corners if it means getting ahead.
BEHAVIORAL CLUES:
• Inappropriately charming, fast-talker
• Tendency of taking things a little too far
• Willing to break the rules to get ahead
• Always on the lookout for a new angle
The Uploader
saves all of their work to a personal
cloud software account, regardless
of company policy.
WARNING SIGNS:
Whether deliberate or unintentional, the Uploader saves
everything to a personal cloud account. He or she refuses to
use network drives or company-sanctioned cloud stores.
BEHAVIORAL CLUES:
• Lacks trust in corporate systems and software
• Virtually no files saved to computer or personal
network files
• May be hesitant to share his or her work
The Ex
was romantically involved with a coworker
and recently experienced a breakup or
an existing relationship is on the rocks.
WARNING SIGNS:
The Ex constantly obsesses about a coworker he or she used
to date. He or she may attempt to access business accounts or
personal files of the former partner, often triggering multiple
failed password attempts as a result.
BEHAVIORAL CLUES:
• Stalker-like behavior
• Propensity toward revenge or vindictive behavior
• Comments like “they’ll be sorry”
Red Flags
• Exporting abnormally large amounts of contact data
out of CRM or other databases.
• Sudden interest in the company’s network and
databases outside the scope of official job role.
• Failed password attempts.
• Attempts to access other employee accounts.
• Sudden increase in free space on employee’s computer.
• Deleting large numbers of files or emails.
• Changing computer configurations.
• Repeated attempts to access privileged folders
on the Intranet or shared drive.
• Sudden appearance of external drives to back up data.
• Sudden change in behavior around taking a laptop home at night.
• Installation of unsanctioned sync and share software like Box,
Google Drive, or Dropbox.
Mitigate the Risk
• Implement endpoint backup to monitor the movement
of data on the endpoint.
• Monitor access to secured databases and software.
• Follow up with employees who repeatedly attempt to
access secured resources.
• Remind employees that resign of the non-compete and
non-disclosure agreements they signed when they were hired.
• Connect the ability to receive severance to the promise
not to steal or use IP or other company data.
• Follow through when a breach occurs.
• Foster communication between Human Resources, IT and
the employee’s supervisor to monitor possible bad actors.
Userbehavioris
a businessblindspot
Weseewhatyoucan’t
www.code42.com/contact

Más contenido relacionado

Destacado

Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...Gill Hamilton
 
Tips To Implementing Multiple Cloud Storage APIs
Tips To Implementing Multiple Cloud Storage APIsTips To Implementing Multiple Cloud Storage APIs
Tips To Implementing Multiple Cloud Storage APIsSNIACloud
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresselerMike Resseler
 
Product Card - Axon Fleet
Product Card - Axon FleetProduct Card - Axon Fleet
Product Card - Axon FleetJoshua Taylor
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
IT Security Awareness - Veteris IT Services
IT Security Awareness - Veteris IT ServicesIT Security Awareness - Veteris IT Services
IT Security Awareness - Veteris IT ServicesJochen den Ouden
 
Workshop presentatie - nve - 31 -01-2017
Workshop   presentatie - nve - 31 -01-2017Workshop   presentatie - nve - 31 -01-2017
Workshop presentatie - nve - 31 -01-2017Jochen den Ouden
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramObserveIT
 

Destacado (15)

Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...
Proposed use of METS (Metadata Encoding & Transmission Standard) at National ...
 
Tips To Implementing Multiple Cloud Storage APIs
Tips To Implementing Multiple Cloud Storage APIsTips To Implementing Multiple Cloud Storage APIs
Tips To Implementing Multiple Cloud Storage APIs
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresseler
 
Product Card - Axon Fleet
Product Card - Axon FleetProduct Card - Axon Fleet
Product Card - Axon Fleet
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
IT Security Awareness - Veteris IT Services
IT Security Awareness - Veteris IT ServicesIT Security Awareness - Veteris IT Services
IT Security Awareness - Veteris IT Services
 
Loi keynote (pdf)
Loi keynote (pdf)Loi keynote (pdf)
Loi keynote (pdf)
 
Workshop presentatie - nve - 31 -01-2017
Workshop   presentatie - nve - 31 -01-2017Workshop   presentatie - nve - 31 -01-2017
Workshop presentatie - nve - 31 -01-2017
 
Integral-Imagen
Integral-Imagen Integral-Imagen
Integral-Imagen
 
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 

Último

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 

Último (20)

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 

How to Spot the 6 Archetypes of Insider Exfiltration

  • 1. HowtoSpottheSixArchetypes of Insider Exfiltration The key to stopping insider exfiltration is recognizing the threat and learning to identify the individuals most likely to steal sensitive data. Knowing which personae to watch for could help an organization avoid a costly breach.
  • 2. The Ship Jumper is looking for or just accepted a new job. WARNING SIGNS: Frequent absences, unexplained disappearances or unexpected medical appointments can be signs of a Ship Jumper. Workers who have accepted a new job are the most likely to give data to a competitor, especially in positions such as sales, product development, and business intelligence. BEHAVIORAL CLUES: • Dissatisfaction with current position • Negative attitude • Talks trash about goings on at the company
  • 3. The Unhappy Camper may have received a poor performance review, been passed over for promotion or been placed on a performance improvement plan. WARNING SIGNS: Employee may be consistently out sick the day after receiving news of poor performance or reprimand. He or she keeps score and may show a propensity toward revenge or vindictive behavior. BEHAVIORAL CLUES: • Negative affect • “Out-to-get-me” attitude • Quick to point the finger, blames others • Poisons the well
  • 4. The Spendthrift is experiencing acute or chronic financial problems. WARNING SIGNS: Employee talks excessively about money and how much things cost in a negative light. He or she always seems to be in a financial jam, may get calls from collection agencies at work or talk about taking on a second job to increase cash flow. BEHAVIORAL CLUES: • Admission of financial problems • Talking about needing to find a new source of income • Lifestyle doesn’t match income level • Borrowing money from coworkers
  • 5. The Angler is always working schemes to exploit perceived weaknesses or vulnerabilities in people and systems. WARNING SIGNS: The Angler is often a fast talker who brags about working or gaming the system at work and/or in his or her personal life. He or she has no qualms with breaking the rules or cutting corners if it means getting ahead. BEHAVIORAL CLUES: • Inappropriately charming, fast-talker • Tendency of taking things a little too far • Willing to break the rules to get ahead • Always on the lookout for a new angle
  • 6. The Uploader saves all of their work to a personal cloud software account, regardless of company policy. WARNING SIGNS: Whether deliberate or unintentional, the Uploader saves everything to a personal cloud account. He or she refuses to use network drives or company-sanctioned cloud stores. BEHAVIORAL CLUES: • Lacks trust in corporate systems and software • Virtually no files saved to computer or personal network files • May be hesitant to share his or her work
  • 7. The Ex was romantically involved with a coworker and recently experienced a breakup or an existing relationship is on the rocks. WARNING SIGNS: The Ex constantly obsesses about a coworker he or she used to date. He or she may attempt to access business accounts or personal files of the former partner, often triggering multiple failed password attempts as a result. BEHAVIORAL CLUES: • Stalker-like behavior • Propensity toward revenge or vindictive behavior • Comments like “they’ll be sorry”
  • 8. Red Flags • Exporting abnormally large amounts of contact data out of CRM or other databases. • Sudden interest in the company’s network and databases outside the scope of official job role. • Failed password attempts. • Attempts to access other employee accounts. • Sudden increase in free space on employee’s computer. • Deleting large numbers of files or emails. • Changing computer configurations. • Repeated attempts to access privileged folders on the Intranet or shared drive. • Sudden appearance of external drives to back up data. • Sudden change in behavior around taking a laptop home at night. • Installation of unsanctioned sync and share software like Box, Google Drive, or Dropbox.
  • 9. Mitigate the Risk • Implement endpoint backup to monitor the movement of data on the endpoint. • Monitor access to secured databases and software. • Follow up with employees who repeatedly attempt to access secured resources. • Remind employees that resign of the non-compete and non-disclosure agreements they signed when they were hired. • Connect the ability to receive severance to the promise not to steal or use IP or other company data. • Follow through when a breach occurs. • Foster communication between Human Resources, IT and the employee’s supervisor to monitor possible bad actors.