First, be very careful with who you hire to administer your system.
The following audit tables are populated with triggers. Even if he bypasses the trigger for his changes, you can at least view the data before he changes it (especially from your backup).
The third automatic backup is deleted off-site. That way, even if the bad guy dumped the database and deleted the backup in place, you have a backup position. Make sure that the backup copy outside the site is not accessible to the database administrator, only someone has rights who do not have production rights on the database server.
Then there are no direct rights to the tables for all but the administrator. This means using stored procedures without dynamic SQL. This, at least, prevents unauthorized access to other data. It’s now harder for your accounts to commit fraud.
There are no rights to administer production for everyone except the administrator, and the other as a backup. That way, if you find that the trigger has changed, you know who did it. Now everything is going wrong, you have only two suspects.
SQL Server 2008 has DDL triggers that tell you who made structural changes. Again, if the trigger did not record the change, it was made by the administrator by default.
Encrypt backups and certain personal data, making it difficult to steal. Now it’s more difficult for a person who delivers off-site to steal your data.
The fire of any administrator who turned out to be unreliable, even if it was not data that he did not trust. If he fakes a schedule or steals office supplies, he will steal data. If he is arrested for some serious crime (and not a violation of the rules of the road), you can suspend him, if necessary, to check if the charge is proven.
When the administrator decides to switch to another job, do not let him have access to your system from the moment he tells you that he is going. If you shoot him, this is especially important.