Identity theft 2.0: New strategies and how organisations can respond

6 tips how companies can recognise and prevent insider threats