Monday Buzz: How Employees Create Cybersecurity Risks

Read Raegan Johnson’s article about how employees themselves create cyber security risks for the company on Associations Now : By now, we all know that all employees—not just IT staff—are responsible for preventing cybersecurity attacks. But prevention isn’t the only thing bosses should be worried about when it comes to their employees. Have you considered […]

Security reality check: The real threat is closer to home

Organizations and governments often underestimate insider threats and the damage they can do. Read the full article here. Cognitio’s Take: One of the biggest organizational risks to mitigate are trusted individuals with authorized access to, or knowledge of, sensitive data or business operations. These individuals can potentially wittingly or unwittingly damage your business. Mitigating this risk is further complicated […]

Insiders, hackers causing bulk of 2017 healthcare data breaches

Ransomware and hacking incidents plagued 2016, and this year is no different, with the latest Protenus Breach Barometer midyear report finding that 2017 is on pace to exceed last year’s rate of one breach per day. Read about the new Protenus Breach Barometer midyear report which found that insider threats and hacking attacks caused majority of […]

Managing Insider Threats: Bupa Insurance Breach Affects 547,000 Customers

International health insurance provider Bupa Global recently acknowledged that an employee had inappropriately accessed and removed information on 108,000 health insurance policies covering a total of 547,000 current and former customers. Read how insider threat caused a mega data breach in Bupa Insurance on eSecurity Planet.

Outsider or Insider: Who Will Cause Today’s Data Breach?

In today’s cybercrime landscape, threats come not only from all sides, but also from within. In its annual Threat Intelligence Index, IBM X-Force called 2016 the “year of the mega breach.” As threat actors become more sophisticated, enterprises must deal with outsiders who target corporate networks to steal product, client and customer data. Then there […]

Disgruntled Employees and Other Internal Threats to Your Cyber Security

Baker Donelson’s Data Protection, Privacy and Cybersecurity attorneys are pleased to continue a series of client alerts that address significant cyber-threats to your business and discuss ways you can protect your business with thoughtful and timely planning before an emergency arises. Read how disgruntled employees are a big threat to businesses on JD Supra.

Businesses warned of insider cyber threat

Read Paul Wallbank’s article about insider threats to businesses on Australian Financial Review : When high-profile fashion startup Showpo found its customers were being contacted out of the blue by a competitor, its executives knew something was amiss. A quick check of their system logs showed its emerging competitive threat had come from within, as one […]

Human factor: The Blindspot in Cybersecurity

As a major international centre for trade, finance and logistics, a cyberattack on Singapore’s network could potentially impact the wider regional and global economy. Despite the rapidly changing face of cyberattacks in this digital age, many logistics companies continue to rely heavily on traditional programmes and tools to tighten their security infrastructures.  Read the full […]

Why Your Employees Are Still Your Greatest Security Risk

Read Mark Stone explain why employees are still the greatest cyber security risk for companies on Forbes : Imagine your company has what you think is the best security software available. You feel as if you’ve done your due diligence and assume your posture has never been better. But that posture is only as good […]

How Proper Offboarding Can Help Prevent Data Breaches

Read  Aliah D. Wright explain it is necessary for every organisation to have a proper employee exit strategy to prevent data breaches on SHRM Blog : Shortly after she was fired from her job at the City of New Haven recently, a Connecticut woman reportedly snuck back into her former office, copied data onto her […]