Social engineering is hard to prevent. That's the tough part. A lot of prevention comes from IT compliance best practices. But still, even in the case of Edward Snowden, how can you tell something bad is happening when it appears to be a user with clearance? We'd recommend diligent monitoring and analytics to try to understand when this is happening. For instance, if you have a number of highly sensitive files, you should track when those are downloaded/shared. An IT administrator should also receive instant notifications when these actions are taken on sensitive files. Finally, there should be logs that are analyzed regularly to understand abnormal usage behaviors. For instance, if the file is downloaded after hours, it should be a red flag. Or if multiple sensitive files from same user are downloaded, that should be identified and looked into.
Similar to a data cap, a bandwidth limit refers to a fixed volume of data that can be transferred over a period of time. For example, if your ISP sets your bandwidth limit to 50Mbps, then it would take 20 seconds to download a 1GB (1,000MB) file. 781b155fdc