By Veriato - January 16, 2019
BASF Employees Caught Stealing Trade Secrets for Millions
One of the most valuable data sets any manufacturing company has is its ...
By Veriato - January 15, 2019
Ex-UBS Employee Suspected of Data Theft Becomes a Fugitive
If it was your organization, you’d like to know based on logged user activity ...
By Veriato - January 14, 2019
Fight Timecard Fraud and Wage Theft with Employee Monitoring
Timecard fraud is more colloquially known as “lowered productivity,” as well as ...
By Veriato - January 07, 2019
Who to Consider an Insider Threat in Your Organization
With 53 % of organizations experiencing at least one insider attack within the ...
By Veriato - December 31, 2018
How to Conduct a Workplace Investigation
Workplace investigations can be extremely tense. Here’s a step-by-step guide to ...
By Veriato - December 24, 2018
How to Maintain Data Security When Employees Work Remotely
How can you allow your employees to work remotely and still maintain security? ...
By Veriato - December 17, 2018
How to Conduct an Endpoint Network Security Audit
An endpoint security audit is an excellent way to ensure your network is ...
By Veriato - December 10, 2018
Cyber Security Budget Trends for Businesses in 2019
Here are a few cyber security trends to adopt in 2019 that will keep your ...
By Veriato - November 26, 2018
Healthcare's Insider Threat
Veriato's Pete Nourse on Why This Is the Sector's Achilles Heel
By Veriato - November 19, 2018
What is User and Entity Behavior Analytics?
UEBA sets baselines for human activity and also for the activity of the ...
By Patrick Knight - November 05, 2018
Election Interference Attacks More than Voting Machines
When election interference is discussed, you probably think of hacked voting ...
By Veriato - October 01, 2018
What you should do after a spear phishing attack
Spear phishing is very common and the likelihood it happens to someone in your ...
By Veriato - September 17, 2018
2 Big Steps to Keep Electronic Health Records Secure
The fear of stolen PHI and its consequences is so strong that many healthcare ...
By Veriato - August 17, 2018
Why Zero Trust Is Not As Bad As It Sounds
Zero Trust means organizations never implicitly trust anyone with their ...
By Veriato - July 23, 2018
How to Create Incident Response Plan Steps for Data Breaches
By following these steps to create your incident response plan you’ll minimize ...
By Veriato - July 02, 2018
Machine Learning Protects Employee Privacy & Data Security
Employee monitoring software leveraging machine learning prioritizes both ...
By Veriato - June 18, 2018
How to Protect Against a Ransomware Attack
Ransomware is changing so are network security offerings. Here are a few things ...
By Veriato - June 04, 2018
The CA Consumer Privacy Act | What Businesses Need to Know
Even if your business is not located in California, you may be liable under the ...
By Patrick Knight - May 28, 2018
How Employee Monitoring Keeps Clinical Trial Data Secure
Many organizations rely on 3rd party services to handle their data. Increasing ...
By Patrick Knight - May 21, 2018
Cyber Incident Reporting Compliance for Federal Contractors
Federal regulations require federal contractors to report a cyber incident ...
By Patrick Knight - May 14, 2018
Data Security Considerations for Your Work From Home Policy
Work from home policies have soared in popularity. Take these data security ...
By Veriato - May 07, 2018
The Severity of Cyber security Threats
Cyber security threats are being realized by vulnerable organizations large and ...
By Veriato - April 30, 2018
Best practices for securing your data when terminating an employee
Secure your data when terminating an employee. Make sure the employee is the ...
By Veriato - April 23, 2018
Employee Monitoring Ethics | Ethically Monitoring Employees
Is employee monitoring ethical? Organizations have a right to protect their ...
By Veriato - April 16, 2018
The Benefits of Starting A User Activity Monitoring System
If you’re on the fence about starting a user activity monitoring system (UAM) ...
By Veriato - April 09, 2018
GDPR Mandates Immediate Data Breach Reporting
GDPR mandates that notification must be given when a breach is likely to ...
By Veriato - April 02, 2018
General Data Protection Regulation Compliance Objectives
The EU General Data Protection Regulation (GDPR) is the most significant ...
By Veriato - March 26, 2018
The Growth of AI and Employee Monitoring In the Workplace
Recently the Economist published two articles that discussed the increasing us ...
By Veriato - March 12, 2018
Internet of Things security practices for your business
The Internet of Things (IoT), or internet-enabled devices that collect and act ...
By Veriato - February 26, 2018
3 ways cyber security is changing business operations
As cyber security receives more consideration, business operations are changing ...
By Veriato - February 12, 2018
4 reasons to increase hospital cyber security budget
Health organizations are allocating less than half of what other industries ...
By Veriato - February 05, 2018
Technical safeguards for HIPAA at the administrative level.
Learn from experts how establishing HIPAA technical safeguards at the ...
By Veriato - January 29, 2018
Security concerns and solutions for staying HIPAA compliant
While HIPAA itself isn’t broken out into separate objectives for each ...
By Veriato - January 22, 2018
Expert advice on HIPAA data security
Learn from top security experts about the concerns facing HIPAA data security ...
By Patrick Knight - January 15, 2018
Defense Against Enemies, Foreign and Domestic
The inclusion of defense against domestic threats points to our Civil War and ...
By Veriato - January 08, 2018
Insider Threats are a Risk to Your Data—Here’s How to Stop Them
Most companies have already hunkered down to prevent hackers from stealing ...
By Veriato - January 01, 2018
U.S. Elevates Cyber Command to Combatant Status
Whether with national security or your enterprise security, cyber security ...
By Veriato - December 25, 2017
Additional Insight into Quantifying Insider Risk
Never before have there been so many platforms that let a growing number of ...