2017 was a major milestone for IT Security Central. We finished the year strong with over 50,000 page views and 300 published posts. This year, we aim to continue to push the pre-existing boundaries of conversation around insider threats and active data loss prevention.

IT Security Central is your top source for information on insider threats and data security. In January, we honed in on important aspects of these subjects, and we approached them with responses from top security experts in the field and more.

As we look back, our audience – YOU – enjoyed and engaged with several top posts on the blog. We’ve highlighted them here.

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts SpeakHow to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, security was usually overlooked, limitations not put into place and nonessential employees given administrative access to make important changes to data. [READ MORE]

Cyber Security Tips and Tricks: The Best Kept Secrets

 

Cyber Security Tips and Tricks: The Best Kept Secrets
Cyber crime is expected to cost the world $6 trillion per year by 2021, up from $3 trillion in 2015. Almost unbelievably, profits will surpass that of global illegal drug trade. [READ MORE]

 

Employee Monitoring Ethics: Considerations and ImpactsEmployee Monitoring Ethics: Considerations and Impacts
It has become common understanding among people that when they begin work at an organization, there is a high chance that their activity will be monitored. While most employers are well within their rights to monitor activity that occurs within their business, there are both legal and ethical considerations to keep in mind. Employee monitoring has produced a lot of positive contributions to organizations, however as tools have advanced so too has the complexity of negative impacts as well. [READ MORE]

Data Security 2017: Lessons Learned Last YearData Security 2017: Lessons Learned Last Year

There is absolutely no doubt that last year was a notoriously memorable year. Not only did the stolen NSA cyber weapons become integrated into new dangerous forms of ransomware, the scale of attacks were global. Many other data breaches happened as well and seemed to have been caused by negligent insiders. [READ MORE]

 

Cyber Security Statistics 2017: Data Breaches and Cyber AttacksCyber Security Statistics 2017: Data Breaches and Cyber Attacks

When companies talk about a record-setting year, most of the time there’s cause for celebration. Maybe they had record sales or closed the year with record profits. [READ MORE]

 

 

Employee Monitoring Statistics and Trends: Everything You Need to Know About the Emerging IndustryEmployee Monitoring Statistics and Trends: Everything You Need to Know About the Emerging Industry

What is Employee Monitoring? In broad terms, employee monitoring is watching the activity of an individual on the job. In earlier days, this might have been limited to a surveillance camera trained on the retail or shop floor. Today, the industry has grown to include devices such as smart badges and employee monitoring software. [READ MORE]

Insider Threat Detection