Unit 8 Db#2 + 2 Responses What are the best ways to prevent insider theft? Explain your answer. Please use outside research to back up what you say and be

Unit 8 Db#2 + 2 Responses What are the best ways to prevent insider theft? Explain your answer. Please use outside research to back up what you say and be sure to cite your sources. In fighting against insider threats/thefts the best practice would be by keeping logs, although it is tedious and extra work no one wants to do it is necessary. Logging both property and user actions is effective in combating insider threats. Keeping a consistent chain of custody allows for property to not as easily be taken, misplaced, or lost. Just handing out supplies or equipment creates an environment of “he said she said” with no clear answer. This is why keeping a chain of custody is the most effective way to protect against insider theft. What method do yall say is most effective?
Coles-Kemp, L., & Theoharidou, M. (2010). Insider threat and information security management. In Insider threats in cyber security (pp. 45-71). Springer, Boston, MA.

Hello everyone,
Insider theft is becoming an increasing risk amond companies. There a few ways to prevent insider theft. One of those ways is to monitor and record user activity withing the organization’s network. Making use of tools with advanced capabilities such as automatic incident response and UEBA can be a great way of monitoring traffic and responding to threats in the event one arises. Another way is to limit administrator or privlaged access to giving each user the exact amount of access they need to accomplish their job and nothing more. (Ekran, 2020). Multifactor authentication for user accounts is another way to prevent insider theft by requiring each user to verify multiple points of data to gain access to the specified system or path. In conclusion, there should always be systems in place to mitigating insider risk. 
References:
Ekren 2020. Insider Data Theft: Definition, Common Scenarios, and Prevention tips.
https://www.ekransystem.com/en/blog/insider-data-theft-definition

Looking for this or a Similar Assignment? Click below to Place your Order