By Patrick Knight - July 11, 2019
Are Your Employees Watching Netflix at Work?
Workplace productivity is directly related to company profitability. Employers ...
By Dr. Christine Izuakor - July 08, 2019
Cyber Security Trends in the Tech Industry
The tech industry is one of the most swiftly evolving areas of business today.
By Dr. Christine Izuakor - July 03, 2019
The Rise of Ransomware as a Service (RaaS)
Ransomware is a form of cyber - attack in which criminals block access to ...
By Dr. Christine Izuakor - July 02, 2019
Four Misconceptions About Ransomware Addressed
Ransomware has been a hot topic within the cyber security industry and is ...
By Dr. Christine Izuakor - June 26, 2019
Guide to Preventing, Detecting and Responding to Ransomware Attacks
Despite a small decline in the total volume of ransomware attacks, assailants ...
By Dr. Christine Izuakor - June 25, 2019
Notable Ransomware Attacks from 2019 and Lessons Learned
Examples of successful ransomware attacks and lessons we can learn from each.
By Dr. Christine Izuakor - June 18, 2019
What is Ransomware?
Since the first documented ransomware attack occurred, the attack method has ...
By Veriato - June 11, 2019
6 Useful Tips for Becoming an Active Listener
When leaders become more aware of their employees as individuals, they increase ...
By Veriato - June 10, 2019
Is Cultural Transformation the Secret to Productivity?
Employee Monitoring Software, Employee Productivity, veriato, veriato employee ...
By Veriato - May 23, 2019
How Emotional Intelligence Boosts Leadership Effectiveness
Organizations are taking the time to learn how leaders with a high level of ...
By Dr. Christine Izuakor - May 21, 2019
Employee Investigations 101
An employee investigation is a process for gathering, analyzing, and reporting ...
By Dr. Christine Izuakor - May 16, 2019
Five Common Insider Threat Profiles
Insider Threats come in many different shapes and forms and can be a ...
By Veriato - May 07, 2019
7 Ways to Make your Workforce More Productive
The US Department of Labor states that most people work an average of eight ...
By Dr. Christine Izuakor - May 06, 2019
Cyber Security Trends in Healthcare
A significant portion of breaches reported in the last year impacted the ...
By Dr. Christine Izuakor - May 02, 2019
A Quick Guide to Preventing, Detecting & Responding to Insider Threats
The key to addressing inevitable Insider Threats within organizations is to ...
By Dr. Christine Izuakor - April 29, 2019
Five Concerning Breaches That Started With an Insider Threat
Behind every breach is a human or entity orchestrating an attack to make it ...
By Dr. Christine Izuakor - April 24, 2019
Insider Threat Detection Software to Increase Employee Productivity
Imagine that for every 100 employees you’ve hired, 70 of them are ...
By Dr. Christine Izuakor - April 22, 2019
What is User and Entity Behavior Analytics and why does it matter?
The fundamental operating principle of UEBA is to create a picture of what ...
By Dr. Christine Izuakor - April 16, 2019
What Is DLP. Why Does It Matter. What Is Your Strategy Missing?
Once upon a time, protecting critical data assets meant keeping printed ...
By Veriato - April 02, 2019
Dark Web Recruitment of Employees Puts Organizations at Risk
The idea of your employees being solicited on the Dark Web isn’t a ...
By Dr. Christine Izuakor - March 25, 2019
What You Should Know About Ransomware in 2019
It’s estimated that Ransomware costs will climb to roughly $11.5 billion in ...
By Veriato - March 21, 2019
Five ways AI is being used in the cybersecurity industry
Businesses no longer have to spend hours sifting through financial records to ...
By Veriato - March 19, 2019
What is artificial intelligence?
Artificial Intelligence is an umbrella term that is often used to describe the ...
By Veriato - March 04, 2019
What is Machine Learning?
Generally, artificial intelligence is the concept of making systems “smart” and ...
By Veriato - February 22, 2019
What Is an Insider Threat and the 5 Things You Should Know?
According to a 2018 Ponemon Institute report, of those surveyed, ove 3k known ...
By Veriato - February 06, 2019
Bad Password Management Puts Organizations at Risk
Ponemon’s State of Password and Authentication Security Behaviors Report ...
By Veriato - February 01, 2019
Apple Employee Steals Thousands of Self-Driving Car Files
No greater tech is at the forefront of cutting-edge technology than the ...
By Veriato - January 24, 2019
Why Data Breaches are caused by Employee Negligence
Every company wants to avoid a data breach. Most efforts are placed on ...
By Veriato - January 23, 2019
Most Crime is Perpetrated by Employees Already Inside Companies
The introspective look at the UK’s £1.2 billion in 2018 fraud cases by KPMG ...
By Veriato - January 21, 2019
Serious About Insider Threats? Start Paying Attention to the Dark Web
Insiders keen on making money from the valuable data your organization holds ...
By Veriato - January 21, 2019
How to Detect Employee Fraud - Malicious Insider Protection
These are four tools & practices you can adopt to detect employee fraud should ...
By Veriato - January 16, 2019
BASF Employees Caught Stealing Trade Secrets for Millions
One of the most valuable data sets any manufacturing company has is its ...
By Veriato - January 15, 2019
Ex-UBS Employee Suspected of Data Theft Becomes a Fugitive
If it was your organization, you’d like to know based on logged user activity ...
By Veriato - January 14, 2019
Fight Timecard Fraud and Wage Theft with Employee Monitoring
Timecard fraud is more colloquially known as “lowered productivity,” as well as ...
By Veriato - January 07, 2019
Who to Consider an Insider Threat in Your Organization
With 53 % of organizations experiencing at least one insider attack within the ...
By Veriato - December 31, 2018
How to Conduct a Workplace Investigation
Workplace investigations can be extremely tense. Here’s a step-by-step guide to ...
By Veriato - December 24, 2018
How to Maintain Data Security When Employees Work Remotely
How can you allow your employees to work remotely and still maintain security? ...
By Veriato - December 17, 2018
How to Conduct an Endpoint Network Security Audit
An endpoint security audit is an excellent way to ensure your network is ...