Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The Severity of Cybersecurity Threats

Across every major news outlet the topic of cyber security threats and data privacy are impossible to miss. From multinational companies being relieved of millions of credit card numbers, to foreign hacking, to the selling of user data via social media, digital security is clearly more important than ever. Threats are being realized by vulnerable organizations large and small.

Best practices for securing your data when terminating an employee

Best practices for securing your data when terminating an employee actually start with the initial onboarding process. Every established organization looking to scale should consult legal counsel after first having drafted an employee handbook. Once created, every employee should be provided an employee handbook outlining the acceptable use policy related to any and all corporate IT resources.

Employee Monitoring Ethics | Ethically Monitoring Employees

All employers want to create a workplace where employees feel safe, valued, and trusted. We know that work satisfaction breeds life satisfaction, and generates more productivity and engagement among employees. As leaders, we naturally question the ethicality of any system involving data and privacy, because we want to make sure our workforce feels protected and trusted. When it comes to employee monitoring, the practice can sound much more sinister than it actually is.

The Benefits of Starting A User Activity Monitoring System

If you’re on the fence about starting a user activity monitoring system across devices or networks, you’re probably wondering if it’s worth the investment, or if you should just be more trusting of your employees. After all, you don’t want them to feel like they’re being micro-managed or taint their opinion of management.

The Growth of AI and Employee Monitoring In the Workplace

Recently the Economist published two articles that discussed the increasing use of AI and employee monitoring in the workplace. Veriato is pleased that we were referenced in both of these articles. We feel they did a good job of presenting a balanced view of the benefits both AI and employee monitoring offer, as well as the potential downsides if they are not implemented and used wisely.

Internet of Things security practices for your business

Wearables, smart speakers, remote security systems, connected cars, inventory trackers, smart headphones: these are just a handful of the connected devices in modern workplaces. The Internet of Things (IoT), or internet-enabled devices that collect and act upon data, is becoming more popular with ever-increasing applications. Far beyond a smart coffee pot that automatically gets the brew going to start the workday, the Internet of Things is changing business security and vulnerability in a big way.

5 employee cyber security training questions you need to ask

Chances are your organization already addresses cyber security to some extent in new employee onboarding. Whether that’s traditional training videos on cyber security that employees watch on their own time, presentations by IT, or brochures, most employees know that their companies have cyber security protocol and best practices. But how many of your employees actually know what the protocol and practices are?