“Somewhere along the line, accounts have access to stuff. Implement base security event monitoring and advanced threat detection (including user behaviour monitoring) to more accurately and quickly detect compromised account activity as well as insider privilege misuse and abuse.”