This important article has information about insider activities that threaten the security of an organization's systems and data and provides suggestions for ameliorating the risk. While there may always be a small number of malicious actors, security is often compromised by people who are simply trying to get tasks accomplished under pressure and step outside security protocols unknowingly. The author emphasizes the need for strong enforcement of effective policies, regular training to reinforce the policies, and on and off-boarding procedures to restrict the flow of data in and out of the organization.
 
 
John Brokaw
GLC National Director of Records