When employees plan to leave an organization, they sometimes use their access rights to steal intellectual property or other data they can use in their next job, or to delete content out of spite. To mitigate these risks effectively, organizations need a clear understanding of what techniques are most likely to be exploited and which activity is a sign of an insider threat in progress.
Watch this on-demand webinar with Brian Johnson where he explains how to spot data theft attempts in real time by watching for events such as:
- Mass file deletions or downloads from SharePoint Online
- Failed attempts to access valuable files and shares
- Repeated tries to log on to an account, which can indicate a password-guessing attack
- Logging into corporate systems at odd hours