Click "File" to receive the print option.
All insiders have some degree of physical or administrative access to the information
system. Stress, divorce or financial problems are some examples of what might
turn a trusted user into an insider threat.