Teramind recommends these three easy steps to detect insider threats or data loss incidents and then act on them automatically:
- Set up monitoring of targeted computers/users for potential risky vectors, e.g., emails, file transfers, web uploads, etc.
- Monitor their activities with behavior analytics (BI Reports) and conduct any assessment or trend analysis. Such as, which employees are uploading too much, and then investigate what type of data they are sharing to have some ideas.
- Set up behavior policies and rules for your specific use cases. You can configure the rule to take automated action. For example, you might want to block the copying of files to external drives, warn when a user tries to download an app from the internet, etc.