Computer espionage cases reveal seemingly countless ways to steal data. One of the best things you can do to get early warning of internal attackers is to implement honeypots. Honeypots by their very nature are fake computers that nothing should ever attempt to contact. Their sole purpose in life is to note any connection attempt and report it for immediate investigation. You can make up several different honeypots, each mimicking varying degrees of sensitive data. These types of honeypots are elaborate enough to allow intruders to do some exploring.”]
Source: https://www.csoonline.com/article/2632002/honeypots–a-sweet-solution-to-the-insider-threat.html

