Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Brute Force Attacks: How to Detect and Prevent Them

The trial and error method has been used to crack passwords ever since systems started using passwords to restrict access. But even today brute force attacks remain a serious danger for organizations. The Threat Horizons Report by Google’s Cybersecurity Action Team shows that brute force was the most common attack vector across cloud providers in the first quarter of 2022.

Engaging Insiders to Combat Insider Threats

Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts to mitigate insider threats, current global risks and economic pressure are fueling the flame. There’s no silver bullet for insider threat protection, however a greater focus on culture, engagement and empowerment can make a real difference.

Cybersecurity Compliance in the Education Industry: How to Protect Students' Personal Data

The education industry is facing a growing threat from malicious cyberattackers, both external and internal. According to the Cyber Attack Trends report by Check Point Research, the education and research industry suffered from 44% more cyberattacks in the first half of 2022 compared to the same period in 2021. Therefore, cybersecurity in the academic industry is of paramount importance now.

Insider Threats: Ensuring Angry Employees and Innocent Do-Gooders Don't Derail Your Organization

Threats that arrive from outside an organization are difficult to deal with, but at least business leaders understand that they exist and prepare a proper defense. However, many managers don’t expect one of their employees to cause a problem from the inside. Sure, there will always be a worker who steals money from the cash register or walks out with a few reams of printer paper, but the true insider threat is much more dangerous. The U.S.

Ekran System Announces Integration with Venn to Enhance Remote Work Security

Ekran System announces its partnership with Venn, a provider of innovative solutions that secure remote work on any unmanaged or BYOD computer. Like Ekran System, Venn is recognized by many cybersecurity experts. It has also been named a Sample Vendor by Gartner. We hope this strategic partnership will mark a significant advancement in fortifying remote work environments against emerging cybersecurity threats.

How to Build an Insider Threat Program [10-step Checklist]

An effective insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect, deter, and respond to insider attacks is necessary for your organization to protect its sensitive data. It’s also required by many IT regulations, standards, and laws: NISPOM, NIST SP 800-53, HIPAA, PCI DSS, and others. In this article, we’ll shed light on the main insider threat program requirements and share the best tips on how to build an insider risk program.