It Doesn’t Take a Bad Actor to Create an Insider Threat
In our last post, we explained why consumer-grade file-sharing services are risky business in terms of data security. These tools are handy, but they provide very little control over how information is accessed and shared.