Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

How to Secure Hybrid Teams Against Insider Threats

As businesses emerge from the pandemic, many are making strategic decisions about their long-term work arrangements. While there is a substantial debate about remaining remote or bringing people back to the office, many companies are choosing to meet in the middle, embracing a hybrid work arrangement that allows people to work both on-site and remotely.

Ransom Attacks & Supply Chains :The Soft Underbelly of Secure Enterprise Systems

The Veriato podcast guest for this month is Michael Owens, the Business Information Security Officer at Equifax and an all around rockstar when it comes to cybersecurity. He joins Dr. Christine Izuakor to discuss how supply chains are like the "soft underbelly" to gain access to otherwise secure enterprise systems.

Shadow IT: What Are the Risks and How Can You Mitigate Them?

Using unapproved tools, software, and devices is risky. You never know what vulnerabilities so-called shadow IT may have. The pandemic that began in 2020 put a new spin on the shadow IT problem. The sudden need to handle all processes remotely was a true challenge, since the majority of corporate networks were not configured to be safely accessed by employees from home.

The Next Disruptive ICS Attacker: A Disgruntled Insider?

Often, the most critical threats come from within an organization itself. This is true for all sectors, but it is especially true for industrial control systems (ICS). Technicians in these environments already have access to plant controls and may have the deep knowledge of industrial processes needed to achieve specific goals. The damage caused by an insider may range from mild disruption to major disaster depending on what is attacked.

Productivity & Privacy: Why Tracking One Doesn't Have to Impede on the Other

Last year’s rapid and sometimes erratic transition to remote work left many businesses looking for new ways to understand employee behavior when working from home. According to a survey of 2,000 employers offering remote or hybrid work, 78 percent deployed employee monitoring software to track worker behavior in the past six months. As businesses emerge from the recent pandemic, it’s clear that some things will not return to business as usual.

Mitigating Insider Threats: Plan Your Actions in Advance

For any organization, insider attacks are like a severe illness: prevention is better than the cure. Like illnesses, insiders mask their malicious actions and can harm your organization for a long time before you detect them. This harm can be in the form of a loss of data, customers, money, etc.   Planning a risk mitigation process helps to stop insider attacks at the early stages or reduce their potential damage.

Insider Threat Prevention: 5 Steps To Improving Defensive Posture By The End Of 2021

As businesses emerge from a pandemic year, cybersecurity concerns are necessarily top of mind . Companies face expansive cybersecurity threats on many fronts, prompting 75 percent of business leaders to view cybersecurity as integral to their organization’s COVID-19 recovery. They undoubtedly face an uphill battle. Surging ransomware attacks and increasingly deceptive phishing scams are attracting national attention, while more than 500,000 cybersecurity jobs remain unfilled in the US alone.

NEW: Screenshot Monitoring, Request Access to Blocked URLs, and More! (v6.0.1 Webinar) | CurrentWare

This video is a recording of a live webinar that took place on July 22nd, 2021. In this webinar CurrentWare's managing director Neel Lukka and product manager Sai Chu provide an overview of the new features available in CurrentWare version 6.0.1.

How to Install CurrentWare On-Premises (Tutorial) - Computer Monitoring Software | CurrentWare

In this video Mike, one of CurrentWare’s technical specialists, will show you how to install CurrentWare's device control, web filtering, and computer monitoring software on-premises. After completing this tutorial you will be able to monitor and control your user’s computers from CurrentWare’s central management console. If you would like to learn how to use CurrentWare to monitor remote workers, that topic is covered in another tutorial.