Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2022

0-Days are on the Rise and that Means a Lot More Work for SOC Teams

In a recent report by the incident response giant Mandiant, which was purchased by Google in March, their researchers found that 2021 was a record year for the total number of 0-day vulnerabilities disclosed and exploited. According to their findings, their team identified some 80 0-days exploited in the wild. At the same time, Google Project Zero researchers reported the detection and disclosure of 58 0-days.

Phishing Awareness 101: How to Email Test Your Employees

Phishing is a constant threat to data and endpoint security. Cybercriminals use phishing attacks to break into accounts, steal company funds, and compromise sensitive data. In this article I will introduce you to the dangers of phishing and guide you through the process of running your very own phishing simulation using BrowseReporter, CurrentWare’s employee computer monitoring software. Table of Contents.

How to Establish an Insider Risk Security Team

The new era of remote work launched by COVID has given millions of employees the ability to work on their own terms and spend more time with their families. Unfortunately, remote work also comes with certain security risks, as organizations now need to guard against increased exposure to cybersecurity concerns with little physical oversight. But embracing remote work does not need to mean handing employees’ laptops with sensitive company information and hoping all goes well.

3 Tips for Mitigating the Insider Threat Facing Government Organizations

Verizon’s Data Breach Investigation Report for 2022 (DBIR) was recently released and it has some good news and it has some bad news when it comes to the risk of insider attacks. First the good news, sort of. According to the DBIR, the vast majority of breaches continue to come from external actors (80% vs 18% of insiders). Hopefully we can be a little less suspicious of Bob who sits two offices down from you. However when an insider attack happens, it can be really, really destructive.

How to Protect Intellectual Property: 6+ Tips for Businesses

Data theft is a very real problem that costs businesses an average of $4.24 million annually. But it’s not just customer data that’s vulnerable, your business’s intellectual property (IP) has a hefty price tag attached to it, too. In this article, you’ll learn the definition of intellectual property, its value in business, and ways to keep it protected. Table of Contents.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.