As more companies work to prevent and detect insider activity, we are gaining clarity on the scale of users intentionally bypassing data security policies or causing operational disruption, both of which can result in financial, reputational and legal damage. We look at the case for an insider threat program, regardless of the size of your business, and the controls you need to implement.