- Set up administrative controls in order to limit access to employee accounts and privileged systems
 - Enable multifactor authentication to prevent an account compromise using stolen credentials
 - Implement logging and auditing systems to record user activity
 - Regularly conduct security assessments to identify potential security vulnerabilities
 - Monitor network activity for unauthorized access to data or devices
 - Encrypt sensitive data to protect against unauthorized access
 - Establish procedures for identifying and responding to insider threats
 
