Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Combatting Insider Threats in Remote Learning Environments

Remote learning is now an inevitable reality for academic institutions. Even before the pandemic, remote learning was on the rise. The pandemic has only made that trend more pervasive and dominant across institutions, most notably among the public schools. The Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded threat intelligence and cybersecurity advisory organization, recorded a 19% increase in cyberattacks targeting K-12 schools in the 2019-2020 school year.

The Most Distracting Websites to Block at Work in 2022

Are distracting websites draining the productivity of your employees? Web filtering software is crucial for enforcing your internet use policy and keeping employees focused on their tasks. After starting your free web filtering software trial this introductory list will help you start blocking internet sites at work.

Should You Use Keyloggers on Employee Computers?

Businesses are constantly analyzing tools that are available to help improve productivity and network security throughout their organization. Consulting with experts to help align on pieces of software and hardware that will come together to develop the most effective strategy is a process that should not be taken lightly. During this process, many businesses may conclude that keyloggers are an effective tool to help reach their organizational goals.

Use Egnyte to Guard Against Insider Threats from Outgoing Employees

One of the biggest societal trends of 2021 has been the “Great Resignation.” For a variety of reasons—including a robust job market and the ongoing impact of the global pandemic—an average of 3.8 million U.S. workers quit their jobs on a monthly basis so far this year. That’s on pace to be the highest resignation rate on record, and the trend recently expanded to include international locations, such as Germany and Denmark.

Implementing endpoint and network security for a hybrid workforce model

The onslaught of the COVID-19 pandemic brought about many changes and disruptions in cybersecurity. Organizations globally shifted to remote work scenarios to enable their employees to work from the comfort of their homes. Since this was a sudden decision, many organizations lacked resources to ensure security while users were operating from locations across the world. These redefined security perimeters provided leeway for bad actors to perform cyberattacks.

Insider Threat Techniques and Methods to Detect Them

Detecting malicious activity takes weeks or even months despite the many efforts companies put into building cybersecurity threat detection systems. You can increase your chances of uncovering malicious activity by studying insider threat techniques and applying diverse detection methods. In this article, we discuss the most common techniques behind insider threats and their possible indicators as well as ways you can detect insider threats in an efficient manner.

Defending Against Social Engineering Attacks with Modern Insider Threat Management

Social engineering is an insidious way of getting "insider access" into an organization's network and data. Threat actors use it to gain sweeping access to carry out sophisticated attacks while evading detection. This "insider" leeway of social engineering makes it an alarming threat that cybercriminals are routinely exploiting now more than ever.

Q3 2021 Threat Landscape Ransomware in the Supply Chain

In a pattern of continued growth across the third quarter of 2021, ransomware remains the dominant threat type, more than doubling since 2021 Q1, fuelled by an exponential increase in the initial access broker marketplace. Incidents of unauthorized access and the risk of insider threats also increased, but to a far lesser extent, accounting for roughly 20% of incidents in the same period.