Skip to main content

6 Unusual Data Behaviors That Indicate Insider Threat

Whether it’s a product developer, a marketing manager, or even a contractor, anyone can move data to a location it’s not meant to be. And most of the time, it’s accidental. Take a look at six unusual data movements that could indicate your employee is leaking data.

This infographic will show:

  • Examples of data movements that should be flagged by your IT or security team
  • The usual suspects behind abnormal data movements (hint: it could be anyone!)
  • Why you need full visibility into unusual file movements

Don't let insiders be the one to compromise your data. Discover how Code42 automatically detects risky behaviors like these – and gives your security team more time to focus on the most critical risks.


How Code42 protects against insider threats –>

An infographic displaying six common employee behaviors that could indicate insider threat activity.


See & stop insider data loss with Code42 –>

About the Author

As the head of Governance, Risk Management & Compliance at Code42, Chrysa has over 12 years of experience in security GRC and security awareness management and training. Prior to Code42, Chrysa initiated security awareness programs at Medtronic and Target. Chrysa holds an MBA degree from St. Thomas and a BA from the University of Minnesota.

Profile Photo of Chrysa Freeman