1. Attempts to Access Unauthorized Systems
Keep an eye on employees or trusted outside users — such as a contractor — who attempt to access systems to which they don't have the rights or have never accessed previously.
"Watch for unusual patterns of access," says Ken Spinner, vice president of field engineering at Varonis. "Insiders will be on the hunt for information and will open files they don't need to do their job."
It is possible that these employees or trusted users may have been assigned to do research outside of their day-to-day roles. But they could also be searching for company financial data, intellectual property, and other important files, so keep an eye on any unusual access efforts, Spinner advises.
Image Source: King Ropes Access via Shutterstock