There are products for this but it means securing every system against someone who already seems a step ahead. Real protection from an enemy-inside-the-gates is difficult and expensive. Do you want the situation to escalate? It's usually cheaper to catch the few who have bad habits.
First thing, ensure computer use policy is well defined and known by everyone. That alone can head off the problem. If problems persist, consider a simple surveillance system for after-hours. You don't have to create a big brother environment. When systems are messed with, review the recordings and act. It doesn't take many HR meetings to stop the abuse, and you can pack up the eyes until next time.
__________________
There are a vast number of people who are uninformed and heavily propagandized, but fundamentally decent. The propaganda that inundates them is effective when unchallenged, but much of it goes only skin deep. If they can be brought to raise questions and apply their decent instincts and basic intelligence, many people quickly escape the confines of the doctrinal system and are willing to do something to help others who are really suffering and oppressed." -Manufacturing Consent: Noam Chomsky and the Media, p. 195
|