Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

CSOs: 69% of Data Breaches are Attributed to Employee Negligence, Theft, or Sabotage

Recent findings report that on average, 96 percent of systems across all industry segments have been breached. While you should absolutely update your information security system and protocols to provide the best protection you can for your data, you should also know how to spot a data breach. Unfortunately the odds of escaping one aren’t in your favor, but you can increase your chances of spotting a breach quickly and containing any damage.

Perpetrated by Employees and Managers Already Inside Companies

KPMG’s Fraud Barometer Says Most Crime is Perpetrated by Employees and Managers Already Inside Companies. The introspective look at the UK’s £1.2 billion in 2018 fraud cases by KPMG demonstrates the need to be mindful of insiders. Each year, professional services company KMPG puts out their annual Fraud Barometer report, providing readers with the state of corporate fraud.

How to Detect Employee Fraud - Malicious Insider Protection

The greatest risk to a company is actually its own employees. Malicious insiders can commit employee fraud in many different ways: data theft, timecard theft, and monetary/asset theft are just a few types of fraud to keep on your radar. Here are four tools and practices you can adopt to detect employee fraud should it happen in your organization.

Who to Consider an Insider Threat in Your Organization

Typically, people think of security threats as outside attacks on an organization. Data security plans tend to focus on securing the perimeter, endpoints, email and data. Though these are certainly critical measures, all organizations should realize the real threat that insiders, or internal employees, pose to operations.

How to Conduct a Workplace Investigation

Workplace investigations can be extremely tense and have high stakes. While every investigation will look a little different based on the nature of the company, HR team and incident, it’s important to have a clearly defined plan for investigating reports filed by employees. Here’s a step-by-step guide to conducting a timely, impartial and thorough workplace investigation.

How to Maintain Data Security When Employees Work Remotely

We all know the perks of allowing employees to work remotely. From lower overhead (less snacks and drinks to provide) to increased productivity and job satisfaction, working from home is becoming more and more common in today’s business landscape. Unfortunately, with this system comes many data security risks to consider. With so many devices being used for work and various network connections to monitor, how can you allow your employees to work remotely and still maintain data security?

Cyber Security Budget Trends for Businesses in 2019

As 2019 approaches, it’s a great time to look ahead at your information security plan and see what is being prioritized in your budget. 2018 saw an increased interest in investing in external security audits and improved endpoint protection. Here are a few cyber security trends to adopt in 2019 that will keep your organization’s information as safe as possible.