Effectively address insider threats

A layered defense strategy with technical, physical, and administrative controls can effectively address insider threats.

One of the most comprehensive guides on the topic is the Common Sense Guide to Mitigating Insider Threats, 4th Edition, published by the CERT program at Carnegie Mellon University. The guide focuses on 19 best practices for mitigating IP theft, IT sabotage, and fraud.

You can read the full article here.