Keeping a close eye on user behavior for any suspicious activity is also vital. In particular, administrators should be on the lookout for any frequent attempts to access sensitive data, particularly from accounts with high levels of privilege.
Source: BlackFog