Palm Beach Gardens, FL, USA
May 16, 2019 | By Dr. Christine Izuakor
Insider Threats come in many different shapes and forms and can be a frustrating problem to diagnose. Adding to the problem is the fact that even the most reliable and seemingly harmless employees can change in an instant and pose a threat. Protecting your company against these sometimes-unpredictable actors requires an understanding of the various profiles that exist and their motivations.
May 7, 2019 | By Dr. Christine Izuakor
The US Department of Labor states that most people work an average of eight hours a day, but the question is, how many of those hours are productive? Employee productivity has been getting a lot of attention lately, and some studies show that workers spend only three hours per day on work tasks. Even if that figure is somewhat exaggerated, the point is that your employees may be busy with unproductive activities while they are on the job.
May 6, 2019 | By Dr. Christine Izuakor
The healthcare industry is one where the mission is very straightforward – empower people to live with the highest quality of life possible for them. This means keeping lives safe and secure, all while armies of cyber criminals are working diligently to do the opposite.
May 2, 2019 | By Dr. Christine Izuakor
One day, a contractor working for an internet service provider decided to sabotage the company by disabling internet connectivity for all customers. Unfortunately, the employee's attack was successful, and the disruption lasted three weeks. This attack cost the company tens of thousands in remediation costs and left many customers struggling to navigate a world without the internet.
Apr 29, 2019 | By Dr. Christine Izuakor
Human beings have been dubbed as one of the most significant risks when it comes to cyber security in organizations. Behind every breach is a human or entity orchestrating an attack to make it happen. Within the affected organization, there is usually a human action that leads to the success of the attack.
Aug 23, 2018 | By Veriato
Since you’re reading this guide, it’s likely you recognize the threat insiders pose to an organization and the need to proactively build a plan to monitor, detect, and respond to potential and active threats. Insiders pose a real threat – 28% of data breaches are perpetrated by insiders, and institutional fraud is almost always an insider.
Jun 26, 2018 | By Veriato
Organizations focused on security threats tend to focus on the external attacker. Solutions used to secure the perimeter, endpoints, email, and data are put in place. While absolutely necessary, they organizations lack the ability to equally protect against the insider – the employee that puts the organization at risk through either malicious intent or negligence.
May 30, 2018 | By Veriato
Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you’ve “trusted” them as part of their employment, but when the time comes to change jobs, you can’t always be certain about the motive for the move.
May 11, 2018 | By Veriato
The results of the SANS survey on insider threats show that organizations are starting to recognize the importance of protecting against the insider threat but struggle to deal with it; as one might expect, larger organizations are more likely to have provisions for responding to such threats.
May 10, 2018 | By Veriato
The class of cyber actor with the greatest capacity to cause harm to organizations is not the so called state-sponsored hacker or cyber-terrorists. It is the “insider” – the company’s employees, ex-employees, and trusted vendors.
Mar 22, 2019 | By Veriato
Malicious and accidental insiders alike have drawn renewed attention to the Insider Threat. Patrick Knight of Veriato offers new insight on the scale of the problem and how to tackle it.
Feb 14, 2019 | By Veriato
We've all seen what's possible with the Dark Web thanks to Silk Road. If you're interested in buying or selling someone's private data like social security numbers or credit card information, it’s disturbingly easy to do. All you need is a computer, a Tor Browser and Cryptocurrency, and it's all completely anonymous.
- March 2017 (1)
- May 2017 (1)
- June 2017 (1)
- August 2017 (1)
- September 2017 (2)
- November 2017 (1)
- December 2017 (1)
- January 2018 (4)
- February 2018 (3)
- March 2018 (3)
- April 2018 (5)
- May 2018 (12)
- June 2018 (1)
- July 2018 (3)
- August 2018 (5)
- September 2018 (3)
- October 2018 (1)
- November 2018 (5)
- December 2018 (5)
- January 2019 (7)
- February 2019 (5)
- March 2019 (6)
- April 2019 (5)
- May 2019 (4)