A recent headline noted research that found “Companies spend $100B for idle employees annually”. Researchers examined the factors contributing to idle time and why…
Employees
Employee Monitoring: How to Prevent Insider Threats Without Being Called Big Brother
In today’s landscape, cyber security is an ongoing battle. Businesses of all sizes are constantly assessing their risks and deploying technology to mitigate them.
What is Employee Monitoring? Statistics and Trends on the Emerging Industry
What is Employee Monitoring? In broad terms, employee monitoring is watching the activity of an individual on the job.
How Employee Monitoring can Help Solve England’s Productivity Problem
Can the data you get from employee monitoring software help drive productivity – and other financial – benefits?
Applying Security Lessons from Private Industry to the Government Sector
The Defense Department continues to struggle to keep secret data from being leaked by employees or contractors or posted online by anonymous hackers.
2018 Crowd Research Partners ‘Insider Threat Report’: hopes and fears revealed
An overwhelming number of organizations feel vulnerable to insider attacks – but you might be surprised at the top three risk factors enabling this…
Identify and Mitigate Against the Professional Insider Attack
Insider threats can be classified as non-malicious (the result of an oblivious or negligent insider) or malicious (the result of an insider looking to…
Insider Threats in Federal Government: The Data and the Response
Federal government agencies could commit more than $1 billion in fiscal 2017 to insider threat countermeasures, according to Bloomberg Government data.
Productivity, Innovation, and Security Can Co-Exist
A survey of 175 security professionals from across Europe revealed that as many as 94% of users prioritize employee productivity over security concerns, thereby…
Top Most-Sold Information on the DarkNet
You can get all kinds of things on the DarkNet, from guns and drugs to private information. Information - of individuals and companies -…
Living off the Land Attacks: The Underground Economy and Ransomware
‘Living off the land’ has traditionally meant a reliance on surviving through hunting, gathering, or subsistence farming. The meaning is much darker when we…
Do’s and Don’ts of Cyber Security in The Workplace
A key to making any business successful is having top-notch cyber security protection. One loose end in the workplace could put the entire business…