Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Government Frameworks and Regulations for Insider Threats

Government offices deal with sensitive information all the time. In fact, they deal with the most sensitive kinds of information—classified information, data assets requiring security clearance, or other kinds of classified material subject to additional government requirements. So how do governments deal with insider threats? The federal government has established some pretty extensive and detailed policies to keep data safe.

A More Insightful, Proactive Approach to Employee Monitoring

Also known as “bossware” and even “employee surveillance”, employee monitoring has been placed in the bucket of technologies that companies force on their employees. Whatever you call it, its use is on the rise and it looks like it’s here to stay. As of 2022, 60% of companies use some kind of software to monitor employees. General productivity isn’t the only justification for implementing employee monitoring.

8 Best Practices for CISO Effectiveness in 2023

The third quarter of 2022 was challenging for government and corporate servers across the globe — we witnessed a 70% increase in data breaches over the second quarter’s numbers. Considering that security lapses are mainly on the shoulders of CISOs, it’s vital to know the instruments for improving their effectiveness. This blog post outlines a white paper written by former Gartner analyst Jonathan Care.

Why Ransomware is Not Just a Technical or Insider Risk Problem

In this video, we explore why ransomware is not just a technical or insider risk problem, but a larger issue with how we approach technology and economic factors. With multiple parties involved, it is difficult to get a handle on this prevalent issue. However, we discuss what organizations can do preemptively to protect themselves and have a stronger negotiation position against ransomware actors.

The Biggest Cloud Security Challenges in 2023 and How to Avoid Them

With the rapid growth of cloud technology, it is no surprise that security has become a major concern for organizations. Cloud computing provides numerous advantages in terms of cost savings and scalability, but these benefits come with risks. As businesses move to the cloud, they must be aware of the potential security threats and take appropriate steps to protect their data and systems from malicious actors.

Top 5 Inadvertent Mistakes of Privileged Users and How to Prevent Them

Your organization most likely has privileged users — employees, subcontractors, and even customers who are authorized to access critical applications and sensitive data. But those elevated access rights make an organization vulnerable. If a privileged user makes a mistake or an attacker gets access to a privileged account, your most valuable data is at risk.

5 Data Center Security Threats Businesses Must be Aware of in 2023

As reported by CIOSEA News, global cyber attacks saw an increase by 38 percent in 2022. This is in comparison to the percentage of such attacks seen in 2021. It's an alarming situation, one that clearly shows that cyber security threats are constantly growing. In some countries, cyber attacks were more severe and greater in number than in others. DIGIT News reported that the UK saw a 77 percent increase in cyber attacks in 2022. These are astounding figures, and they all point to how dangerous cyberspace has become.

How to Reduce Insider Threat Risks in a Hybrid Office: 10 Best Practices

The Covid-19 pandemic has changed the way we work forever. Although some part of the workforce returned to the office as soon as restrictions loosened, many employees wish to continue working remotely. According to data from Gartner, 60% of knowledge workers are remote, with at least 18% not planning to return to the office anytime soon. A hybrid office is a great option for both types of workers.