Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Training Will Be Key to Retaining SOC Analysts

Working in a Security Operations Center (SOC) is like working in an emergency room on a weekend shift at 2 AM. The steady stream of new alerts screaming for attention and combined with the lack of enough trained personnel make it a miracle that it all seems to work through on a string and a prayer. The question is though, when will the luck run out?

The Impact of Cyberattacks on Healthcare

While the COVID-19 pandemic brought much of the world to work together to advance medical research and slow the spread of the disease, it may be of little surprise that cyber threat actors took advantage of the pandemic for their own personal gain. While all industries can be affected by a cybersecurity incident, the nature of the health and human services industry’s mission poses unique challenges.

Insider Risk: Are You Monitoring Employees Working Outside Your Network?

Every employee is hired to do a job, but every employee also represents potential risk to their company. In the past year, 68% of employers have noted an increase in insider attacks. The top attacks include fraud, monetary gain and IP theft and cost companies millions of dollars. One major reason for an increase in insider risk in the past year is remote work. Not only are people outside of their manager’s physical view, they are often working outside of their company’s network.

How to Reduce the Risk of Former Employees Coordinating with Insider Threats

When it comes time for an employee to leave your organization, you want it to be on friendly terms. But there are definitely limits to how friendly you want folks to be after they leave. Especially when it comes to accessing materials from their old position for their new endeavors. In a recent bizarre case, it was reported that a former acting Department of Homeland Security Inspector General has pleaded guilty to stealing government software and data for use in his own product.

Moving Beyond Fear, Uncertainty, and Doubt (FUD): 3 Ways to Strengthen Your Cybersecurity Today

Fear, uncertainty, and doubt (FUD) is no longer just another fancy blockchain-related term used to influence the public’s and investors’ opinions. This concept thrives in many fields, turning our attention to the problems of data, system, and operational security. In this article, we discuss the FUD meaning in cybersecurity and how this concept works.

Cybersecurity Trends for 2022: Why Staying Ahead of the Threat Has Never Been So Critical

2021 was a devastating year for cybersecurity. As business accelerated digital adoption and people played out their lives online, threat actors were ready to capitalize on the transitional moment, savagely targeting everything from critical health infrastructure to small and medium-sized businesses. By Q4 of 2021, the number of reported data breaches had already surpassed 2020 totals, which were historic in their own right.

CurrentWare is Verified as Citrix Ready!

CurrentWare’s suite of user activity monitoring, web filtering, device control, and remote PC power management software has been verified as Citrix Ready®. The Citrix Ready program helps users of Citrix Virtual Apps and Desktops (formerly Citrix XenApp and XenDesktop) identify third-party solutions that are verified as compatible with a Citrix VDI deployment.