Latest Posts

ekran

People-centric Security for Remote Workers

In striving to make sure in-office and remote employees’ work is secure, organizations often rely on technology-centric approaches. Although user monitoring tools and other cybersecurity solutions do their jobs, they still can’t affect employee behavior and fully secure remote work. To engage remote employees into cybersecurity, organizations are now shifting to a human-centric approach.

ekran

How to Build an Insider Threat Program [10-step Checklist]

An efficient insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect, deter, and respond to insider attacks and inadvertent data leaks is a necessity for any organization that strives to protect its sensitive data. It’s also required by many IT regulations, standards, and laws: NISPOM, NIST SP 800-53, HIPAA, PCI DSS, and others. In this article, we’ll share best practices for developing an insider threat program.

ekran

12 Best Cybersecurity Practices in 2021

Is your sensitive data secure? It’s no exaggeration: any company can fall victim to cyber crime. Reports of cyber attacks come from government organizations, educational and healthcare institutions, banks, law firms, nonprofits, and many other organizations. Hackers, insider threats, ransomware, and other dangers are out there. Smart businesses are investing more in cybersecurity to eliminate risks and keep their sensitive data safe, and this has already brought the first results.

ekran

Insider Threat Risk Assessment: Definition, Benefits, and Best Practices

Insider threats are expensive. The average cost of an insider threat rose to $11.45 million according to the 2020 Cost Of Insider Threats Global Report [PDF] by the Ponemon Institute. Companies have to spend a fortune on lawsuits, fines for non-compliance with security requirements, and to mitigate the consequences of cybersecurity incidents. Not to mention the negative impact such incidents have on an organization’s reputation.

ekran

Incident Response Planning Guideline for 2021

When faced with a real-life cybersecurity threat, few organizations know what steps to take first in order to handle the incident and minimize its impact on the business. Having a well-thought-through cyber security incident response plan (IRP) in place is the only way to get yourself fully prepared for dealing with this kind of situation. In this article, we’ll tell you in detail how you can build an IRP that perfectly fits the needs of your business.

ekran

7-Step Checklist for GDPR Compliance

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ private data. It applies to all organizations that process the personal data of European Union citizens and residents, and the fines for non-compliance reach up to €20 million. In this article, we explore the nature of this regulation, list its key principles, and offer a seven-step checklist for meeting GDPR compliance requirements.

ekran

Insider Threat Statistics for 2020: Facts and Figures

Insiders remain one of the key threats to corporate cybersecurity. But insider threats are changing: they’re becoming more frequent, trickier to detect, more damaging, and, ultimately, more costly. Industry statistics and reports on insider threats help us detect those trends and upgrade our security to combat them.

ekran

What Is an Insider Threat? Definition, Types, and Countermeasures

Every company has plenty of insiders: employees, business partners, third-party vendors. They all have a certain level of access to corporate infrastructure and business data: some have limited access to general information of low value, while others can easily access the most valuable and sensitive data. This access is what makes insiders one of the greatest threats to a company’s cybersecurity. And this is why it’s important to understand what an insider attack is.

ekran

7 Third-Party Security Risk Management Best Practices

Cooperation is the key to success. Working with third parties helps businesses increase their productivity and efficiency, produce better products and services, employ highly qualified experts, and cut costs. But all these benefits come at the price of increased cybersecurity risks. Minor flaws in your third-party vendor’s security and privacy routines may turn into cybersecurity weaknesses for your company.

ekran

5 Real-Life Examples of Breaches Caused by Insider Threats

Employees know all the ins and outs of a company’s infrastructure and cybersecurity tools. That’s why we witness hundreds of malicious and inadvertent insider attacks that lead to data breaches and harm companies. Such attacks often lead to financial and reputational losses and may even ruin a business.