Practical controls for mitigating insider threats in telecommunication service providers