The weakest link in most organizations is the employees. In fact, most security breaches involve internal users, a risk often referred to as insider threat.
How Can Companies Protect Themselves?
Amigorena: At a more granular level, you can set and enforce rules to restrict and control user logins as well as access to specific files and folders. Preventing or limiting concurrent or multiple logins is one such restriction that will reduce what's called the 'attack surface' – the sum of vulnerable points open to a breach. Monitor real-time access across the network on all sessions including Wi-Fi and VPN, and record and audit who was connected, from which system, since what time and for how long. This will help flag anomalies in individual usage, which will help you see and respond to potential breaches in advance, as well as provide an audit trail to minimize damage in the event of a breach.