Get Pricing Start Free Trial

Insider Threat Blog

Posted on Friday, July 29, 2016 by David Mai
This is part three in our three-part series about the problems with DLP. Now that we’ve discussed the headaches endpoint DLP solutions cause, and we’ve figured out the DLP doesn’t work on its own (it doesn’t take the people problem into consideration), we can now talk about the solution! With ObserveIT you can augment DLP, so you can prevent both external and internal threats. Here are 7 security controls ObserveIT provides to help you deal with Insiders before they become threats: 1. Deter... Continue Reading →
Posted on Tuesday, July 26, 2016 by Michael Gordover
Has anyone at your company (or even you!) ever used a work laptop to view adult websites or gaming sites? If so, you need to be aware of a new virus that’s targeting people for blackmail -- and adding yet another attack vector that corporations must understand and mitigate in the war against insider threat. A new Trojan called Delilah goes after individuals via social engineering, using a would-be victim’s webcam to capture compromising footage in order to extort them into an action – such as... Continue Reading →
Posted on Tuesday, July 19, 2016 by David Mai
ObserveIT is a lightweight endpoint solution that is focused on identifying and eliminating insider threats. By continuously monitoring user behavior, ObserveIT alerts IT and security teams to activities that put your organization at risk. Here are the Top 4 Reasons you need User Activity Monitoring Now!  Real-Time Security Awareness With optional notification to users that their session is being recorded, instances of unsanctioned and reckless activity decrease dramatically.  IT users can be... Continue Reading →
Posted on Tuesday, July 5, 2016 by Gaby Friedlander
There is a lot to keep in mind when protecting your business from insider threats. Between trying to understand what to look for and whom to watch, staying on top of security threats requires a smart approach. To help on that end, here are five key considerations to further understand insider threats: Consideration #1: Every Business Function is a Potential Source of Risk It’s easy to assume that vital financial and legal documents are the only things at risk from insider threats. But in... Continue Reading →
Posted on Wednesday, June 29, 2016 by David Mai
Today at ObserveIT, we tweeted out an article about Javascript malware spreading on Facebook via Google chrome:   Researchers found that the Javascript malware works by sending users a notification that they have been tagged in a comment by one of their Facebook friends. Once the user clicks the link, the malware automatically begins to download on their device. Then, when the user clicks on certain files and images, the malware becomes executed; infecting the computer. I didn’t know about the... Continue Reading →
Posted on Friday, June 24, 2016 by Gaby Friedlander
This article is a more in-depth discussion on a previous article: Digital Investigation & HR: An Insider Threat Checklist. You’ve just performed a digital investigation of an employee and determined they are an insider threat. What’s the best way to confront an insider threat? Here, Doug Sampson, Founder & CEO at Soteritech discusses the Human Aspect of Insider Threat Investigations. First things first. When you first receive an out-of-policy notification or a tip comes in, your Hub... Continue Reading →
Sneaky Employee?
Posted on Thursday, June 23, 2016 by Michael Gordover
Update, June 23, 2016: According to the Toledo Blade:  Jamie Knapp was found guilty of accessing confidential patient records. After 2 hours of deliberation, a U.S. District Court jury returned the verdict for Jamie Knapp, 26, of Adrian on a misdemeanor count of obtaining individually identifiable health information. She faces a maximum sentence of a year in prison for a violation of the federal Health Insurance Portability and Accountability Act. Prosecutors have said Knapp accessed more than... Continue Reading →
Posted on Wednesday, June 22, 2016 by Gaby Friedlander
This is part two in our three-part series about the problems with DLP. A lot of the companies we meet with are using DLP for web and email, but they have exhausted all efforts to justify ROI. Every day, we speak with cyber security professionals who want to rip it out in frustration after encountering troubled installations, blue screens, fruitless classifications and hundreds of high-maintenance rules.  So, how do you fix the problem? You know the pain points and shortcomings of your endpoint... Continue Reading →
DLP
Posted on Thursday, June 9, 2016 by Gaby Friedlander
This is part one in our exclusive three-part series on DLP problems and how to solve them. Data loss prevention (DLP) is a billion dollar industry. In fact, your company has probably invested a significant amount of your cyber security budget to protect your confidential data from being shared outside the company. But, how are industry giants like Morgan Stanley and AT&T still suffering from major insider breaches – didn’t they have DLP?  They did. They still do. But just using DLP isn’t... Continue Reading →
GDPR Insider Threat
Posted on Tuesday, June 7, 2016 by David Mai
If you've worked in IT or Cybersecurity for the past 5 years or so, then you've no doubt seen the trend change from criminals targeting systems, to criminals targeting people. It's simple thinking, but whether a person just hasn't had their coffee in the morning, or is rushing through emails, the potential for human error is high. In short, people are the weakest link in cyber security today! With this new way of criminal thinking, countries around the world have had to institute specific... Continue Reading →

Pages

Try it Now
Contact Us