ÒÁÈËÖ±²¥

Skip to main content

6 Unusual Data Behaviors That Indicate Insider Threat

Whether it’s a product developer, a marketing manager, or even a contractor, anyone can move data to a location it’s not meant to be. And most of the time, it’s accidental. Take a look at six unusual data movements that could indicate your employee is leaking data.

An infographic displaying six common employee behaviors that could indicate insider threat activity.

This infographic shows:

  • Examples of data movements that should be flagged by your IT or security team
  • The usual suspects behind abnormal data movements (hint: it could be anyone!)
  • Why you need full visibility into unusual file movements

Don't let insiders be the one to compromise your data. Discover how ÒÁÈËÖ±²¥ automatically detects risky behaviors like these – and gives your security team more time to focus on the most critical risks.


See & stop insider data loss with ÒÁÈËÖ±²¥ –>

About the Author

As the head of Governance, Risk Management & Compliance at ÒÁÈËÖ±²¥, Chrysa has over 12 years of experience in security GRC and security awareness management and training. Prior to ÒÁÈËÖ±²¥, Chrysa initiated security awareness programs at Medtronic and Target. Chrysa holds an MBA degree from St. Thomas and a BA from the University of Minnesota.

Profile Photo of Chrysa Freeman