A cybersecurity method that flags anomalous user activities based on profiles of their typical habits and behaviors.