Get Pricing Start Free Trial

Insider Threat Blog

Posted on Wednesday, September 28, 2016 by ObserveIT
IT teams deal with security incidents every day, despite investing heavily in the most advanced cybersecurity tools.  Whether it’s malicious or well intentioned, your employees, vendors and other trusted users may be actively working in security blind spots that cannot be monitored by the security tools in which you’ve invested. When malware is accidentally downloaded, or files are deleted, or sensitive information is sent via web mail, how will you know what happened and who did it? Proper... Continue Reading →
Posted on Tuesday, September 27, 2016 by ObserveIT
Confidential company data has been posted on a public website. What happened? How long will it take to find out? Where do you look for answers? How much does not knowing cost your organization from a time and productivity standpoint? Security professionals know better than anyone: investigating potential security incidents can be time consuming — and without the right security tools and programs, the mean time to detect (MTTD) to the mean time to resolve (MTTR) can be quite lengthy. The... Continue Reading →
Posted on Monday, September 26, 2016 by ObserveIT
There isn’t an individual in any company who doesn’t worry about failing an audit for non-compliance. And whether it’s PCI, SOX, HIPAA, NERC, FFIEC, FISMA or FERPA, when it comes to audit compliance of dozens or even hundreds of deployed applications, IT is not exempt from its share of requirements (or pain).  Not only are there costly penalties when violations are discovered, but when a business is not in compliance with specific regulations, it can be particularly damaging to a business’... Continue Reading →
Posted on Wednesday, September 21, 2016 by ObserveIT
In a public service announcement the FBI stated that disgruntled and former employees cost companies anywhere between $5,000 to $3 million dollars in cyber incidents after leaving the organization. According to recent research from Gartner, “seeking harm and revenge on employers is a bigger incentive for insider threats than is stealing money.” This is why, when an employee turns in his notice, is written-up for an infraction, is generally disgruntled, or believes they may be part of a... Continue Reading →
Posted on Wednesday, August 24, 2016 by David Mai
CISO’s see servers and devices, apps and logs, traffic and clouds. With the Splunk® platform security teams are able to see data—everywhere. This kind of Operational Intelligence enables the curious to look closely at what others ignore—machine data—and find what others never see: insights that can help make a company more productive, profitable, competitive and secure. But machine data, no matter how well it’s organized, can be cumbersome to sift through when trying to swiftly investigate an... Continue Reading →
Posted on Wednesday, August 17, 2016 by David Mai
Former Employee Arrested for Taking Customer’s Identity! Former Bank Employee Arrested for Stealing from Customer’s Account! The headlines are rolling in almost daily, as employees are being arrested for Insider Threat offenses. As such, CISO’s are increasingly realizing the importance of getting ahead of the problem by developing a comprehensive Insider Threat Management Program. As any effective CISO knows, user activity monitoring - complete with video recording and playback – is an absolute... Continue Reading →
Posted on Friday, July 29, 2016 by David Mai
This is part three in our three-part series about the problems with DLP. Now that we’ve discussed the headaches endpoint DLP solutions cause, and we’ve figured out the DLP doesn’t work on its own (it doesn’t take the people problem into consideration), we can now talk about the solution! With ObserveIT you can augment DLP, so you can prevent both external and internal threats. Here are 7 security controls ObserveIT provides to help you deal with Insiders before they become threats: 1. Deter... Continue Reading →
Posted on Tuesday, July 26, 2016 by Michael Gordover
Has anyone at your company (or even you!) ever used a work laptop to view adult websites or gaming sites? If so, you need to be aware of a new virus that’s targeting people for blackmail -- and adding yet another attack vector that corporations must understand and mitigate in the war against insider threat. A new Trojan called Delilah goes after individuals via social engineering, using a would-be victim’s webcam to capture compromising footage in order to extort them into an action – such as... Continue Reading →
Posted on Tuesday, July 19, 2016 by David Mai
ObserveIT is a lightweight endpoint solution that is focused on identifying and eliminating insider threats. By continuously monitoring user behavior, ObserveIT alerts IT and security teams to activities that put your organization at risk. Here are the Top 4 Reasons you need User Activity Monitoring Now!  Real-Time Security Awareness With optional notification to users that their session is being recorded, instances of unsanctioned and reckless activity decrease dramatically.  IT users can be... Continue Reading →
Posted on Tuesday, July 5, 2016 by Gaby Friedlander
There is a lot to keep in mind when protecting your business from insider threats. Between trying to understand what to look for and whom to watch, staying on top of security threats requires a smart approach. To help on that end, here are five key considerations to further understand insider threats: Consideration #1: Every Business Function is a Potential Source of Risk It’s easy to assume that vital financial and legal documents are the only things at risk from insider threats. But in... Continue Reading →

Pages

  • English
  • Français
  • русский
  • 简体中文
  • Deutsch
  • 日本語
  • Português
  • Español
Try it Now
Contact Us