Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Phishing Awareness 101: How to Email Test Your Employees

Phishing is a constant threat to data and endpoint security. Cybercriminals use phishing attacks to break into accounts, steal company funds, and compromise sensitive data. In this article I will introduce you to the dangers of phishing and guide you through the process of running your very own phishing simulation using BrowseReporter, CurrentWare’s employee computer monitoring software. Table of Contents.

How to Establish an Insider Risk Security Team

The new era of remote work launched by COVID has given millions of employees the ability to work on their own terms and spend more time with their families. Unfortunately, remote work also comes with certain security risks, as organizations now need to guard against increased exposure to cybersecurity concerns with little physical oversight. But embracing remote work does not need to mean handing employees’ laptops with sensitive company information and hoping all goes well.

3 Tips for Mitigating the Insider Threat Facing Government Organizations

Verizon’s Data Breach Investigation Report for 2022 (DBIR) was recently released and it has some good news and it has some bad news when it comes to the risk of insider attacks. First the good news, sort of. According to the DBIR, the vast majority of breaches continue to come from external actors (80% vs 18% of insiders). Hopefully we can be a little less suspicious of Bob who sits two offices down from you. However when an insider attack happens, it can be really, really destructive.

How to Protect Intellectual Property: 6+ Tips for Businesses

Data theft is a very real problem that costs businesses an average of $4.24 million annually. But it’s not just customer data that’s vulnerable, your business’s intellectual property (IP) has a hefty price tag attached to it, too. In this article, you’ll learn the definition of intellectual property, its value in business, and ways to keep it protected. Table of Contents.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

How to Enable Two-Factor Authentication (2FA) in the CurrentWare Suite | CurrentWare v7.0.1 Tutorial

This video will teach you how to set up two-factor authentication (2FA) in CurrentWare version 7.0.1. Two-factor authentication provides an extra layer of security if anyone other than you attempts to log in to your CurrentWare web console using your account.

Two-Factor Authentication, App Productivity & Admin Logs (v7.0.1)

CurrentWare version 7.0.1 is here! With this release we’re excited to announce the introduction of two key security features: Two-factor authentication (2FA) and our first two admin activity logs! These enhancements provide an extra layer of security to help ensure that only trusted operators are accessing your admin console while providing greater visibility into what they are doing within the CurrentWare Suite.

How to Stop Insider Threats With UEBA

As the digital transformation continues at full speed, the majority of humanity's routine activities have begun to be carried out through digital channels. As the world digitizes, the potential loot in the lap of hackers grows. That's why we witness the development of new cyber threats every day. This requires all organizations, from the smallest to the largest, to be prepared for advanced cyber attacks.

Ekran System Provides New Report Customization Opportunities for Microsoft Power BI Users

Ekran System is glad to announce new capabilities for integrating with Microsoft Power BI that will help you simplify data processing and visualization. Since the majority of our customers use Microsoft Power BI to visualize data, optimizing the Ekran System API for working with this tool was a top priority for us. Now, you can easily and quickly export your monitoring data from Ekran System directly to a report template of your choice in Power BI.