Already this year, we have a plethora of reports and surveys covering data breaches and insider threats.
Latest posts
How to Detect Insider Threat Signals Across a Dispersed Workforce
Breaches caused by insiders are a fact of corporate life: among 874 breach incidents reported by companies to the Ponemon Institute, 568 were caused…
Monitoring Employees’ Social Media Activity
Today, most employees have a social media presence and likely spend a portion of each day sharing an update or two.
Don’t Forget to Share Security Policies with Your Remote Workers
Remote workers - telecommuters, freelancers, ‘gig economy’ members - make up an increasing percentage of the workforce.
Shadow IT Is Harmful to Your Security Health: Focus on Prevention Instead of Cure
Corporate IT teams have long bemoaned the use of shadow IT. This hasn’t stopped the practice, and the rise of cloud software adds a…
AWS Permission Check Feature Now Free to Help Guard Against Breaches
Incidents at Alteryx, Accenture, and the NSA have highlighted the risks when data goes unprotected in the cloud. Amazon just made a key feature…
Internet of Things Device Security: Solutions, Risks and Concerns
We’ve previously posted advice about where to acquire your IoT devices and how to keep these devices safe.
What is the Most Productive Work Schedule for Employees? Analyzing the Hours
A recent University of Texas-Austin study found that over 78% of employees experience idle time at work, with over 21% of employees experiencing idle…
More Data Was Accessed During Equifax Data Breach
The past week brought news that more personal information than previously documented was exposed in the Equifax data breach.
A Guide to Protecting and Monitoring Your Personal Cyber Security: Active Listening
In the second part of our series, A Guide to Protecting and Monitoring Your Personal Cyber Security, we look at ways you can monitor…
Cryptomining on Tennessee Hospital Server: Latest Incident in Growing Trend
Decatur County General Hospital in Tennessee just announced discovery of cryptomining software on a server that hosts its electronic medical records (EMR) system.
Swisscom Data Breach Highlights Vulnerability in Supply Chain
A data breach at one of its partners exposed the contact details of approximately 800,000 Swisscom customers.