How to Prevent and Detect Insider Threat