Sometimes employees follow cybersecurity best practices beyond company policies

Nearly two-thirds (64%) of employees use a company-approved device for work. However, less than half (40%) of those who use a personal device are regulated when using that personal device, according to a new survey of 1,000 full-time employees published by Clutch. Employees use personal devices for routine, daily work activities. Among those surveyed who […]

Insider threat blind spot enables employee revenge attacks

Based on threat assessments from global organizations in public and private sector industries, Dtex Systems determined there are active insider threats in all assessed organizations. This is clear proof that none have been able to eliminate the insider threat blind spot. Failure to gain visibility is allowing malicious and negligent employees to engage in undetected high-risk activities […]

Survey Shows Sensitive Data Goes Astray in Email

Nearly half (45%) of employees have accidentally included banking information in email sent to an unintended recipient outside the organization, a new study found. The Clearswift survey of 600 senior business decision makers and 1,200 employees across the UK, US, Germany, and Australia, shows that more than a quarter of users have been on the receiving […]

$8.76 million: The average yearly cost of insider threats

According to The Ponemon Institute’s report, “2018 Cost of Insider Threats: Global Organizations,” the average cost of an insider threat annually is $8.76 million. It’s critical for organizations to understand the main causes of insider threats, because detecting insiders in a timely manner could save millions of dollars. Depending on the industry and size of company, the cost of an […]

Why human vulnerabilities are more dangerous to your business than software flaws

Cybersecurity firms and analysts have been sounding the alarm on vulnerabilities in most web-based systems. But a recent report from cybersecurity firm Proofpoint said most cyberattacks are designed to take advantage of human error instead of flaws in hardware or software. In their 2018 Human Factor Report, Proofpoint analyzed cyberattacks throughout 2017, looking into attempted attacks on nearly […]

Third-party and insider threats one of the biggest concerns to IT pros

External threats are not the main concern for IT professionals, but rather breaches that are linked to vulnerabilities caused by staff or third-party vendors operating within an organization’s own network, Bomgar’s 2018 Privileged Access Threat Report reveals. In fact, 50% of organizations claimed to have suffered a serious information security breach or expect to do […]

Misconfigured Clouds Compromise 424% More Records in 2017

Insider mistakes like networked backup incidents and misconfigured cloud servers caused nearly 70% of all compromised records in 2017, according to new data from IBM X-Force. These types of incidents affected 424% more records last year than the year prior, they report. It wasn’t all bad news from the IBM X-Force Threat Intelligence Index, which […]

How companies continue to expose sensitive data to threats

A new study from the Varonis Data Lab found that on average, 21% of a company’s folders were accessible to every employee, and 41% of companies had at least 1,000 sensitive files open to all employees. The report, based on analysis of data risk assessments conducted by Varonis in 2017 for customers and potential customers […]

How to Protect Your Insiders from Being Recruited by Outsiders

Your organization is at risk every day from outsiders seeking to acquire your sensitive and proprietary information for their own gain, whether political or financial, therefore it is critical that your insider threat plan include a strategic approach to managing this risk. The case of Su Bin pleading guilty for selling F-35 secrets to China […]

How to Invest in Your Employees to Strengthen IT Security for Your Business

As we barrel further into the digital age, IT security carries increasing importance to the operation of your business. IT services now represent both the hub of business operations and the primary line of defense for most companies. Accordingly, it is crucial that your employees understand the centrality IT services and security play to the […]