Top 5 IT security red flags that indicate you're vulnerable to insider threats