Dtex report highlights some of the clues that organizations should be looking for to detect and stop insiders engaged in malicious or negligent behaviors. A stunning 95% of the assessments showed employees to be engaged in activities designed to bypass security and web-browsing restrictions at their organizations. The use of anonymous web browsers such as TOR, anonymous VPN services, and vulnerability-testing tools such as Metasploit are examples of the problem, Dtex says. The report is based on an analysis of risk assessments conducted by a sample of its customer base.”]

