By Veriato - March 12, 2018
Internet of Things security practices for your business
The Internet of Things (IoT), or internet-enabled devices that collect and act ...
By Veriato - February 26, 2018
3 ways cyber security is changing business operations
As cyber security receives more consideration, business operations are changing ...
By Veriato - February 12, 2018
4 reasons to increase hospital cyber security budget
Health organizations are allocating less than half of what other industries ...
By Veriato - February 05, 2018
Technical safeguards for HIPAA at the administrative level.
Learn from experts how establishing HIPAA technical safeguards at the ...
By Veriato - January 29, 2018
Security concerns and solutions for staying HIPAA compliant
While HIPAA itself isn’t broken out into separate objectives for each ...
By Veriato - January 22, 2018
Expert advice on HIPAA data security
Learn from top security experts about the concerns facing HIPAA data security ...
By Patrick Knight - January 15, 2018
Defense Against Enemies, Foreign and Domestic
The inclusion of defense against domestic threats points to our Civil War and ...
By Veriato - January 08, 2018
Insider Threats are a Risk to Your Data—Here’s How to Stop Them
Most companies have already hunkered down to prevent hackers from stealing ...
By Veriato - January 01, 2018
U.S. Elevates Cyber Command to Combatant Status
Whether with national security or your enterprise security, cyber security ...
By Veriato - December 25, 2017
Additional Insight into Quantifying Insider Risk
Never before have there been so many platforms that let a growing number of ...
By Veriato - December 11, 2017
Why Trust is not Enough
Why high risk positions need to be monitored closely to help combat insider ...
By Veriato - November 27, 2017
How to Prevent Departing Employees from Pocketing Your IP
When George started his current position 10 years ago, he brought hundreds of ...
By Veriato - November 13, 2017
To cloud, or not to cloud. That is the question.
Thinking about storing sensitive information in the cloud? Be sure of the ...
By Patrick Knight - November 03, 2017
Malware Evading Some Antivirus Using Invalid Certificates?
Many antivirus and endpoint security technologies fight two-sided battle. On ...
By Veriato - October 30, 2017
Don’t Be Held Hostage By Ransomware
Ransomware, a type of malware that encrypts your critical files until money is ...
By Veriato - October 16, 2017
Quantifying the risk of an insider data leak
One of the challenges associated with combating the threat of insider data ...
By Veriato - October 02, 2017
4 Steps to Reduce the Risk of Malicious Insider Activity
Improve your organizational ability to detect insider threats before they ...
By Veriato - September 18, 2017
3 Steps To Protect Your Data From Leaving With A Departing Insider
What is the High Risk Exit Period? It’s the period of time between when an ...
By Veriato - September 04, 2017
The Widespread Risk of Insider Threats
There is a great infographic by Deloitte on the topic of insider threats. ...
By Veriato - August 21, 2017
Best Practices for Mitigating Insider Threats
Here we highlight 5 of the 19 practices that we believe can have a significant ...
By Veriato - August 20, 2017
5 employee cyber security training questions you need to ask
Chances are your organization already addresses cyber security training in new ...
By Veriato - August 07, 2017
The Rise of User Behavior Analytics
Gartner published the Market Guide for User Behavior Analytics. The analysts ...
By Veriato - July 24, 2017
Is Employee Monitoring Legal?
As the number of insider theft, fraud, or lower productivity continues to rise, ...
By Veriato - July 10, 2017
Read this. Pick yourself up off the floor. Then Trust, but Verify.
I work for a company that makes behavioral analytics software for insider ...
By Veriato - June 26, 2017
Attack the problem before the problem attacks you
In our most recent post we identified that only a small number (21%) of ...
By Veriato - June 12, 2017
One million six hundred ninety-one thousand reasons to look inside
62% of security professionals who took part in the survey believe insider ...
By Veriato - May 29, 2017
The data says it's the data
63% of survey respondents are most concerned with data leaks stemming from ...
By Veriato - March 13, 2017
The disgruntled employee insider threat
Computerworld UK has a great article out on the insider data breach at ...
By Veriato - March 06, 2017
The Numbers Boggle The Mind
The vast (overwhelming) majority of your defenses were defeated when the ...
By Veriato - February 27, 2017
A Not Exactly Up-Lyfting Incident
If you haven't seen the news about Lyft and its former COO, check out the ...
By Veriato - February 20, 2017
The barbarians are through the gate.
Insider threats are a big topic - in the news and here at Veriato.
By Veriato - February 13, 2017
Veriato, formerly known as SpectorSoft FAQ
Wondering how SpectorSoft changing to Veriato may affect you? See below for ...
By Veriato - February 06, 2017
What’s in a name? And why change it?
We’ve changed our name to Veriato. So what? Companies change names all the ...
By Veriato - February 06, 2017
Are we counting on a Maginot Line?
A whole lot of time and money gets spent preventing acts or behaviors from ...
By Veriato - January 30, 2017
Can you keep a secret?
According to USPTO.gov, trade secrets consist of info that can include ...
By Veriato - January 16, 2017
Could You Have Seen It Coming?
Anticipating potential employee issues, and having a plan to detect them is a ...
By Veriato - January 09, 2017
Fact: Employees Leave Your Company
Whether it's a 'the door is always open' farewell, or a 'don't let the door hit ...