Every technology user has a habitual relationship with their device —a unique way they use their laptop or smartphone. Each time a user engages with their device, they leave traces of activity data that identifies how they have interacted with the technology, networks, files and how any information they access is shared.
What organisations forget is this data can serve as valuable early warning information by understanding whether their behaviour is risky or insecure for the business. Unlike “creepy-tech” which can be used to track and trace whether employees are doing their work, these relationships can be monitored to detect when the user’s behavior changes and to identify potentially suspicious and nefarious activities.
Identifying suspicious activity can be difficult when an employee’s login credentials to that device say it’s who they say they are. However, there are specific changes in their behaviour that suggests poor employee security practice or worse – in cases of stolen credentials or a laptop left unattended, it’s not the expected user at all.