Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

How to Protect Intellectual Property: 6+ Tips for Businesses

Data theft is a very real problem that costs businesses an average of $4.24 million annually. But it’s not just customer data that’s vulnerable, your business’s intellectual property (IP) has a hefty price tag attached to it, too. In this article, you’ll learn the definition of intellectual property, its value in business, and ways to keep it protected. Table of Contents.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

How to Enable Two-Factor Authentication (2FA) in the CurrentWare Suite | CurrentWare v7.0.1 Tutorial

This video will teach you how to set up two-factor authentication (2FA) in CurrentWare version 7.0.1. Two-factor authentication provides an extra layer of security if anyone other than you attempts to log in to your CurrentWare web console using your account.

Two-Factor Authentication, App Productivity & Admin Logs (v7.0.1)

CurrentWare version 7.0.1 is here! With this release we’re excited to announce the introduction of two key security features: Two-factor authentication (2FA) and our first two admin activity logs! These enhancements provide an extra layer of security to help ensure that only trusted operators are accessing your admin console while providing greater visibility into what they are doing within the CurrentWare Suite.

How to Stop Insider Threats With UEBA

As the digital transformation continues at full speed, the majority of humanity's routine activities have begun to be carried out through digital channels. As the world digitizes, the potential loot in the lap of hackers grows. That's why we witness the development of new cyber threats every day. This requires all organizations, from the smallest to the largest, to be prepared for advanced cyber attacks.

Ekran System Provides New Report Customization Opportunities for Microsoft Power BI Users

Ekran System is glad to announce new capabilities for integrating with Microsoft Power BI that will help you simplify data processing and visualization. Since the majority of our customers use Microsoft Power BI to visualize data, optimizing the Ekran System API for working with this tool was a top priority for us. Now, you can easily and quickly export your monitoring data from Ekran System directly to a report template of your choice in Power BI.

How to Migrate Your Legacy CurrentWare Software to the New Web Console (2022 Tutorial) | CurrentWare

In this video you will learn how to easily upgrade from the legacy desktop version of the CurrentWare Suite to the new web console. By upgrading to the web console you'll gain access to a variety of new capabilities.

Shell Evasion: An Insider Threat

Cybersecurity strategies within cloud environments are often seen as a complicated landscape with rapidly developing technologies, architectures, and terms. Simultaneously, there are continuously motivated individuals and groups trying to utilize vulnerabilities for illicit uses such as to increase access to the data, install malware, disrupt services, and more.

From Behavior Analytics to Security Education: 4 Ways Organizations Should Mitigate Modern Insider Attacks

While the stakes for private sector organizations differ drastically from governments that have to protect state secrets like hacking tools or nuclear technologies, businesses do have their own needs for Data Loss Prevention measures. Organizations can face the threat of data like their intellectual property (IP), source code, customer details, Personally Identifiable Information (PII), financial info, and many other types of information being stolen or corrupted.