The larger the institution and number of high privileged account members, the tougher that managerial decision becomes. Trust should never have to become a factor, but neither should the possibility of negligence leading to lapses in compliance regulations. This risk escalates when, as is often the case, administrator or superuser passwords are shared amongst multiple teams or not frequently changed. In our modern business environment, mobile devices have also become a standard practice, not only among personal use among employees, but as part of daily use for regular protocol procedures. Many tools originally developed to improve the work productivity and employee work-life balance have inadvertently become major gateways towards potential insider threats, as well. Aside from infecting an organization’s system with malware, personal devices such as cell phones and tablets facilitate copying of company data. When an employee decides to quit, copies of company data often stay on these devices, leading to dangerous levels of undetectable data loss.