By Veriato - June 11, 2019
6 Useful Tips for Becoming an Active Listener
When leaders become more aware of their employees as individuals, they increase ...
By Veriato - June 10, 2019
Is Cultural Transformation the Secret to Productivity?
Employee Monitoring Software, Employee Productivity, veriato, veriato employee ...
By Veriato - May 23, 2019
How Emotional Intelligence Boosts Leadership Effectiveness
Organizations are taking the time to learn how leaders with a high level of ...
By Dr. Christine Izuakor - May 21, 2019
Employee Investigations 101
An employee investigation is a process for gathering, analyzing, and reporting ...
By Dr. Christine Izuakor - May 16, 2019
Five Common Insider Threat Profiles
Insider Threats come in many different shapes and forms and can be a ...
By Veriato - May 07, 2019
7 Ways to Make your Workforce More Productive
The US Department of Labor states that most people work an average of eight ...
By Dr. Christine Izuakor - May 06, 2019
Cyber Security Trends in Healthcare
A significant portion of breaches reported in the last year impacted the ...
By Dr. Christine Izuakor - May 02, 2019
A Quick Guide to Preventing, Detecting & Responding to Insider Threats
The key to addressing inevitable Insider Threats within organizations is to ...
By Dr. Christine Izuakor - April 29, 2019
Five Concerning Breaches That Started With an Insider Threat
Behind every breach is a human or entity orchestrating an attack to make it ...
By Dr. Christine Izuakor - April 24, 2019
Insider Threat Detection Software to Increase Employee Productivity
Imagine that for every 100 employees you’ve hired, 70 of them are ...
By Dr. Christine Izuakor - April 22, 2019
What is User and Entity Behavior Analytics and why does it matter?
The fundamental operating principle of UEBA is to create a picture of what ...
By Dr. Christine Izuakor - April 16, 2019
What Is DLP. Why Does It Matter. What Is Your Strategy Missing?
Once upon a time, protecting critical data assets meant keeping printed ...
By Veriato - April 02, 2019
Dark Web Recruitment of Employees Puts Organizations at Risk
The idea of your employees being solicited on the Dark Web isn’t a ...
By Dr. Christine Izuakor - March 25, 2019
What You Should Know About Ransomware in 2019
It’s estimated that Ransomware costs will climb to roughly $11.5 billion in ...
By Veriato - March 21, 2019
Five ways AI is being used in the cybersecurity industry
Businesses no longer have to spend hours sifting through financial records to ...
By Veriato - March 19, 2019
What is artificial intelligence?
Artificial Intelligence is an umbrella term that is often used to describe the ...
By Veriato - March 04, 2019
What is Machine Learning?
Generally, artificial intelligence is the concept of making systems “smart” and ...
By Veriato - February 22, 2019
What Is an Insider Threat and the 5 Things You Should Know?
According to a 2018 Ponemon Institute report, of those surveyed, ove 3k known ...
By Veriato - February 06, 2019
Bad Password Management Puts Organizations at Risk
Ponemon’s State of Password and Authentication Security Behaviors Report ...
By Veriato - February 01, 2019
Apple Employee Steals Thousands of Self-Driving Car Files
No greater tech is at the forefront of cutting-edge technology than the ...
By Veriato - January 24, 2019
Why Data Breaches are caused by Employee Negligence
Every company wants to avoid a data breach. Most efforts are placed on ...
By Veriato - January 23, 2019
Most Crime is Perpetrated by Employees Already Inside Companies
The introspective look at the UK’s £1.2 billion in 2018 fraud cases by KPMG ...
By Veriato - January 21, 2019
Serious About Insider Threats? Start Paying Attention to the Dark Web
Insiders keen on making money from the valuable data your organization holds ...
By Veriato - January 21, 2019
How to Detect Employee Fraud - Malicious Insider Protection
These are four tools & practices you can adopt to detect employee fraud should ...
By Veriato - January 16, 2019
BASF Employees Caught Stealing Trade Secrets for Millions
One of the most valuable data sets any manufacturing company has is its ...
By Veriato - January 15, 2019
Ex-UBS Employee Suspected of Data Theft Becomes a Fugitive
If it was your organization, you’d like to know based on logged user activity ...
By Veriato - January 14, 2019
Fight Timecard Fraud and Wage Theft with Employee Monitoring
Timecard fraud is more colloquially known as “lowered productivity,” as well as ...
By Veriato - January 07, 2019
Who to Consider an Insider Threat in Your Organization
With 53 % of organizations experiencing at least one insider attack within the ...
By Veriato - December 31, 2018
How to Conduct a Workplace Investigation
Workplace investigations can be extremely tense. Here’s a step-by-step guide to ...
By Veriato - December 24, 2018
How to Maintain Data Security When Employees Work Remotely
How can you allow your employees to work remotely and still maintain security? ...
By Veriato - December 17, 2018
How to Conduct an Endpoint Network Security Audit
An endpoint security audit is an excellent way to ensure your network is ...
By Veriato - December 10, 2018
Cyber Security Budget Trends for Businesses in 2019
Here are a few cyber security trends to adopt in 2019 that will keep your ...
By Veriato - November 19, 2018
What is User and Entity Behavior Analytics?
UEBA sets baselines for human activity and also for the activity of the ...
By Patrick Knight - November 05, 2018
Election Interference Attacks More than Voting Machines
When election interference is discussed, you probably think of hacked voting ...
By Veriato - October 01, 2018
What you should do after a spear phishing attack
Spear phishing is very common and the likelihood it happens to someone in your ...
By Veriato - September 17, 2018
2 Big Steps to Keep Electronic Health Records Secure
The fear of stolen PHI and its consequences is so strong that many healthcare ...
By Veriato - August 17, 2018
Why Zero Trust Is Not As Bad As It Sounds
Zero Trust means organizations never implicitly trust anyone with their ...
By Veriato - July 23, 2018
How to Create Incident Response Plan Steps for Data Breaches
By following these steps to create your incident response plan you’ll minimize ...