By Patrick Knight - November 05, 2018
Election Interference Attacks More than Voting Machines
When election interference is discussed, you probably think of hacked voting ...
By Veriato - October 01, 2018
What you should do after a spear phishing attack
Spear phishing is very common and the likelihood it happens to someone in your ...
By Veriato - September 17, 2018
2 Big Steps to Keep Electronic Health Records Secure
The fear of stolen PHI and its consequences is so strong that many healthcare ...
By Veriato - August 17, 2018
Why Zero Trust Is Not As Bad As It Sounds
Zero Trust means organizations never implicitly trust anyone with their ...
By Veriato - July 23, 2018
How to Create Incident Response Plan Steps for Data Breaches
By following these steps to create your incident response plan you’ll minimize ...
By Veriato - July 02, 2018
Machine Learning Protects Employee Privacy & Data Security
Employee monitoring software leveraging machine learning prioritizes both ...
By Veriato - June 18, 2018
How to Protect Against a Ransomware Attack
Ransomware is changing so are network security offerings. Here are a few things ...
By Veriato - June 04, 2018
The CA Consumer Privacy Act | What Businesses Need to Know
Even if your business is not located in California, you may be liable under the ...
By Patrick Knight - May 28, 2018
How Employee Monitoring Keeps Clinical Trial Data Secure
Many organizations rely on 3rd party services to handle their data. Increasing ...
By Patrick Knight - May 21, 2018
Cyber Incident Reporting Compliance for Federal Contractors
Federal regulations require federal contractors to report a cyber incident ...
By Patrick Knight - May 14, 2018
Data Security Considerations for Your Work From Home Policy
Work from home policies have soared in popularity. Take these data security ...
By Veriato - May 07, 2018
The Severity of Cyber security Threats
Cyber security threats are being realized by vulnerable organizations large and ...
By Veriato - April 30, 2018
Best practices for securing your data when terminating an employee
Secure your data when terminating an employee. Make sure the employee is the ...
By Veriato - April 23, 2018
Employee Monitoring Ethics | Ethically Monitoring Employees
Is employee monitoring ethical? Organizations have a right to protect their ...
By Veriato - April 16, 2018
The Benefits of Starting A User Activity Monitoring System
If you’re on the fence about starting a user activity monitoring system (UAM) ...
By Veriato - April 09, 2018
GDPR Mandates Immediate Data Breach Reporting
GDPR mandates that notification must be given when a breach is likely to ...
By Veriato - April 02, 2018
General Data Protection Regulation Compliance Objectives
The EU General Data Protection Regulation (GDPR) is the most significant ...
By Veriato - March 26, 2018
The Growth of AI and Employee Monitoring In the Workplace
Recently the Economist published two articles that discussed the increasing us ...
By Veriato - March 12, 2018
Internet of Things security practices for your business
The Internet of Things (IoT), or internet-enabled devices that collect and act ...
By Veriato - February 26, 2018
3 ways cyber security is changing business operations
As cyber security receives more consideration, business operations are changing ...
By Veriato - February 12, 2018
4 reasons to increase hospital cyber security budget
Health organizations are allocating less than half of what other industries ...
By Veriato - February 05, 2018
Technical safeguards for HIPAA at the administrative level.
Learn from experts how establishing HIPAA technical safeguards at the ...
By Veriato - January 29, 2018
Security concerns and solutions for staying HIPAA compliant
While HIPAA itself isn’t broken out into separate objectives for each ...
By Patrick Knight - January 15, 2018
Defense Against Enemies, Foreign and Domestic
The inclusion of defense against domestic threats points to our Civil War and ...
By Veriato - January 08, 2018
Insider Threats are a Risk to Your Data—Here’s How to Stop Them
Most companies have already hunkered down to prevent hackers from stealing ...
By Veriato - January 01, 2018
U.S. Elevates Cyber Command to Combatant Status
Whether with national security or your enterprise security, cyber security ...
By Veriato - December 25, 2017
Additional Insight into Quantifying Insider Risk
Never before have there been so many platforms that let a growing number of ...
By Veriato - December 11, 2017
Why Trust is not Enough
Why high risk positions need to be monitored closely to help combat insider ...
By Veriato - November 27, 2017
How to Prevent Departing Employees from Pocketing Your IP
When George started his current position 10 years ago, he brought hundreds of ...
By Veriato - November 13, 2017
To cloud, or not to cloud. That is the question.
Thinking about storing sensitive information in the cloud? Be sure of the ...
By Patrick Knight - November 03, 2017
Malware Evading Some Antivirus Using Invalid Certificates?
Many antivirus and endpoint security technologies fight two-sided battle. On ...
By Veriato - October 30, 2017
Don’t Be Held Hostage By Ransomware
Ransomware, a type of malware that encrypts your critical files until money is ...
By Veriato - October 16, 2017
Quantifying the risk of an insider data leak
One of the challenges associated with combating the threat of insider data ...
By Veriato - October 02, 2017
4 Steps to Decrease the Risk of Malicious Insider Activity
Improve your organizational ability to detect insider threats before they ...
By Veriato - September 18, 2017
3 Steps To Protect Your Data From Leaving With A Departing Insider
What is the High Risk Exit Period? It’s the period of time between when an ...
By Veriato - September 04, 2017
The Widespread Risk of Insider Threats
There is a great infographic by Deloitte on the topic of insider threats. ...
By Veriato - August 21, 2017
Best Practices for Mitigating Insider Threats
Here we highlight 5 of the 19 practices that we believe can have a significant ...
By Veriato - August 20, 2017
5 employee cyber security training questions you need to ask
Chances are your organization already addresses cyber security training in new ...