
The question for any modern insider threat program is: How do you protect critical data without stifling productivity, collaboration, and innovation? This is where Code42 Incydr™ and Cortex XSOAR can help. From making Google Drive links public, to external Slack channels, to Salesforce and other application downloads to personal devices, that’s what makes these leaks of confidential data so tough to control. With the increase in remote work and centralizing documentation in the cloud, the ways that employees and contractors can take critical files have increased exponentially. Whether employees are leaving for better opportunities or are getting let go from the company, proper security protocols are critical for organizations to protect themselves from insider threats.ĭata exfiltration remains the most common type of insider threat in the U.S – more than tripling privilege misuse.

Watchlists provide comprehensive insight into file activity of employees you identify as a risk (for example, departing employees, users with elevated permissions, access to sensitive data, on a performance improvement plan, etc.).
