Most organizations today understand the need for technical security solutions to protect from cyber attacks. Few organizations realize that a consequence of secure technical environments is that an attacker will use other methods to create access, for example by recruiting or even placing someone on the inside.
Even fewer know how to handle this growing threat, which is frequently reported to be one of the most significant factors in cases of successful data exfiltration.