Palm Beach Gardens, FL, USA
Jul 11, 2019 | By Patrick Knight
Workplace productivity is directly related to company profitability. Employers are seeking more and more ways to cut waste – including wasteful activities that eat into productivity. Many companies would immediately agree that playing video games, spending excessive time on social media and streaming videos are blatant violations of workplace acceptable use policies.
Jul 10, 2019 | By Dr. Christine Izuakor
Employees know that too much work and not enough play leads to exhaustion and burnout. The World Health Organization now officially recognizes ‘occupational burnout” as a cause of mental and physical health problems in the workplace.
Jul 8, 2019 | By Dr. Christine Izuakor
Level Setting on Tech Companies Let’s start by defining what a technology company is. Think hardware, software, and technology service companies who are creating a form of technology that others can purchase and utilize. Some of the biggest and most popular players in this space that may come to mind include Facebook, Microsoft, IBM and Google. These companies provide pure technology to their consumers for a price. Though common, the sector is not limited to these types of companies either.
Jul 3, 2019 | By Dr. Christine Izuakor
2019 Has been an interesting year for Ransomware thus far. After plaguing countless victims with dreaded ransom notes and bringing some pretty large corporations to their knees, the attack method built a strong reputation for inflicting cyber terror on consumers and businesses. As cyber criminals noticed increasing success from this method, the trends shifted towards more targeted enterprise attacks with the potential for more lucrative payouts.
Jul 1, 2019 | By Dr. Christine Izuakor
Ransomware has been a hot topic within the cyber security industry for quite some time now. It’s an often-lucrative cyber-attack method with an attractive return on investment. The motivation behind Ransomware attacks tends to be primarily financial, as cyber criminals can’t resist such easy opportunities to achieve their malicious goals. Ransomware is effective given that almost every individual or organization owns or has access to digital assets which are valuable to them.
Aug 23, 2018 | By Veriato
Since you’re reading this guide, it’s likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat – 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.
Jun 26, 2018 | By Veriato
Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider – the employee that puts the organization at risk through either malicious intent or negligence.
May 30, 2018 | By Veriato
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you’ve “trusted” them as part of their employment, but when the time comes to change jobs, you can’t always be certain about the motive for the move.
May 11, 2018 | By Veriato
The results of the SANS survey on insider threats show that organizations are starting to recognize the importance of protecting against the insider threat but struggle to deal with it; as one might expect, larger organizations are more likely to have provisions for responding to such threats.
May 10, 2018 | By Veriato
The class of cyber actor with the greatest capacity to cause harm to organizations is not the so called state-sponsored hacker or cyber-terrorists. It is the “insider” – the company’s employees, ex-employees, and trusted vendors.
Mar 22, 2019 | By Veriato
Malicious and accidental insiders alike have drawn renewed attention to the Insider Threat. Patrick Knight of Veriato offers new insight on the scale of the problem and how to tackle it.
Feb 14, 2019 | By Veriato
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it’s disturbingly easy to do. All you need is a computer, a Tor Browser and Cryptocurrency, and it's all completely anonymous.
- March 2017 (1)
- May 2017 (1)
- June 2017 (1)
- August 2017 (1)
- September 2017 (2)
- November 2017 (1)
- December 2017 (1)
- January 2018 (4)
- February 2018 (3)
- March 2018 (3)
- April 2018 (5)
- May 2018 (12)
- June 2018 (1)
- July 2018 (3)
- August 2018 (5)
- September 2018 (3)
- October 2018 (1)
- November 2018 (5)
- December 2018 (5)
- January 2019 (7)
- February 2019 (5)
- March 2019 (6)
- April 2019 (5)
- May 2019 (7)
- June 2019 (6)
- July 2019 (6)