Events
News
About our company
Blog
En
Ar
Es
Pt
En
Ar
Es
Pt
Products
▸
SearchInform DLP
SearchInform Risk Monitor
SearchInform ProfileCenter
SearchInform FileAuditor
▸
Data protection and classification
Access rights audit
User activity audit, investigation
Compliance
Use case: access control and change management
Use case: user behavior and insider detection
Use case: eDiscovery
Use case: file cleanup
SearchInform SIEM
TimeInformer
Cloud solutions
Third-party integration
Services
▸
Services
SearchInform for MSSP
How to max out SearchInform services
Compliance
▸
Saudi Arabian Monetary Authority
GDPR compliance with SearchInform
Personal Data Protection Bill
Resources
▸
White Papers
Research
How to
Practices and use cases
Videos
Partners
▸
Become a Partner
Partner login
Contact us
Events
News
About our company
Blog
Products
SearchInform DLP
SearchInform Risk Monitor
SearchInform ProfileCenter
SearchInform FileAuditor
Data protection and classification
Access rights audit
User activity audit, investigation
Compliance
Use case: access control and change management
Use case: user behavior and insider detection
Use case: eDiscovery
Use case: file cleanup
SearchInform SIEM
TimeInformer
Cloud solutions
Third-party integration
Services
Services
SearchInform for MSSP
How to max out SearchInform services
Compliance
▸
Saudi Arabian Monetary Authority
GDPR compliance with SearchInform
Personal Data Protection Bill
Resources
White Papers
Research
How to
Practices and use cases
Videos
Partners
▸
Become a Partner
Partner login
Contact Us
Book a return call
Home
—
Blog
Blog
Company News
Products News
Press About Us
Blog
Press Kit
Company News
Products News
Press About Us
Blog
Press Kit
2024
2023
2022
2021
2020
2019
2018
2017
2016
2024
2023
2022
2021
2020
2019
2018
2017
2016
Troves of Personal Data Were Exposed, While Regulators Work on Protection
In this weekly overview of major security incidents, you will learn about a several incidents, which lead to exposure of hundreds of GB of confidential data, as well as about the recent amendments to major data protection regulations in Malaysia.
04.12
Blog
(In)Secure Digest: Baguettes' Thief, Disney Sabotage, Credentials' Waterfall
It's time to review November's most noticeable and high-profile information security incidents. In this digest, you’ll find: a multi-million-dollar scam by a former top manager, a “cyber-poisoner” at Disney World, echoes of the MOVEit hack at Amazon and others.
03.12
Blog
Algeria Faces 70M Attacks While Tesla Breach Turns Out False
As November wraps up, headlines tell of cybercriminals targeting Algeria and a recent data breach mistakenly linked to Tesla. Let’s explore the details.
27.11
Blog
Social Media in the Crosshairs
In this digest, we are breaking down how Twitch and Facebook failed in data protection and what these incidents led to.
19.11
Blog
Africa’s Security Landscape: Kenya Rises, Nigeria Struggles, SA loses data
This week’s digest is packed with news from Africa. Let’s explore how the continent is battling with cybersecurity problems.
13.11
Blog
(In) Secure Digest Halloween Edition: What Spooked IS Specialists in October
The Halloween agenda includes a million-dollar scam, a hacker offended by non-recognition of merit, and frighteningly frequent attacks on the game industry representatives.
02.11
Blog
#Personal data
#Fraud
#Confidential documents
UAE’s AI Investments & LinkedIn’s GDPR Fine
The last IS news roundup of October is here for you—let’s dive in!
30.10
Blog
#Compliance
#Personal data
The new portion of insider incidents: cases of remote employee and CISO
In this incident roundup, we are exploring two cases of customer data leakage with insiders being accused of security rules violation.
28.10
Blog
#Personal data
#Remote employees
#Fraud
The Pokémon Developer and Well-known Electronic Device Manufacturer are Facing Data Leaks
In today's roundup, we'll discuss how unauthorized access to Game Freak's servers and a ransomware attack on Casio resulted in the leak of a trove of confidential personal and corporate data.
16.10
Blog
#Personal data
#Third party
#ransomware
Qatar’s Data Breach Fine & Kenya’s Move Toward Digital Inclusion
In this week’s new roundup, we are exploring the details of the data breach that occurred in Qatar and how Africa is making its way to digital safety.
09.10
Blog
#Personal data
#Fraud
(In) Secure Digest: Cyberattack on Dell, Fortinet Cloud Leak, Blackmailing Employee
A roundup of high-profile IS incidents that occurred or came to light last month is here. During September, we witnessed attacks on IS vendors and the leaking of data on millions of Americans.
03.10
Blog
#Personal data
#Internal threat
#Fraud
UAE Warns Residents About Cyber Traps
Today we will talk about the UAE authorities' warnings regarding malicious advertising and... sharing secrets with ChatGPT.
02.10
Blog
#Fraud
#Confidential documents
Data Watchdog Fines Nigerian Banks for Compromising Data
In this review, we examine how Nigerian banks are getting slammed with fines for noncompliance with regulatory requirements.
02.10
Blog
#Compliance
#Personal data
Indonesia’s ID Leak & Link Between Layoffs and Data Breaches
Today, we are here with updates on a data breach investigation from Indonesia and news of an extremely interesting study on the correlation between mass layoffs and increasing data breaches.
25.09
Blog
#Personal data
#Remote employees
#Former employees
#Internal threat
From Cyber Stars to Data Scars: Africa's Top Cybersecurity Role Models Shine as Cameroon Faces Major Data Breach
This week’s IS news roundup comes from Africa. Let’s delve into the Global Cybersecurity Index report and see where African countries rank on it, and explore the details of a serious data breach in Cameroon.
18.09
Blog
#Personal data
#Risk assessment
Slim CD Breach and Turkish Ministry Data Leak
Here’s the first news roundup of the autumn, where we explore the details of the Slim CD data breach and provide updates on the Turkish Ministry of Health information leak during the pandemic.
11.09
Blog
#Personal data
#Risk management
(In) Secure Digest: Netflix Leak, McDonald's Scammers, Rodents vs.Tokens
In this review: a nightmare for League of Legends fans, the largest leak in US history, and another Microsoft outage.
04.09
Blog
Data Security Failures of the Week
In today’s IS news roundup, we will explore the details of the FlightAware and Enzo Biochem cases.
20.08
Blog
#Personal data
#ransomware
Another Day, Another Leak
The past week brought various news about severe data breaches. In this digest, we look at the details of the most significant cases.
15.08
Blog
#Personal data
#Compliance
Malaysia's Information Security Boost and the UK's $9.6 Million Data Blunder
Today we will explore Malaysia’s significant step towards mitigating data leaks and the consequences of a 2022 ransomware attack on a British IT company.
08.08
Blog
#Personal data
#Confidential documents
(In) Secure Digest: Stolen Shib Coins, the Disney Villian, and the Leak of Millions of Americans' Data
In this edition: the latest twist in the Snowflake saga, the adventures of robots.txt, and the case of meme-coin theft.
01.08
Blog
#Confidential documents
#Personal data
#Internal threat
Rising Breach Costs, AI’s Double-Edged Sword, and HealthEquity’s Data Drama
In the last IS news roundup for July, we cover the key findings of IBM and Ponemon's Cost of a Data Breach Report 2024 and share details of the HealthEquity case.
31.07
Blog
#Personal data
#Fraud
#Risk management
A Turbulent Week for Tech and Travelers
This week's news roundup might not be the most uplifting for those planning a trip. However, it is important to dive deeper into the recent events to ensure you are well-informed before you head to the seaside.
24.07
Blog
#Personal data
#Risk management
#Risk assessment
Lulu Data Breach & SOC Future Study
In this week’s digest we are to explore the details of the recent data breach in a major retail company and the key takeaways of the research on SOC future.
17.07
Blog
#Personal data
#Database
Roblox Incident & Security Pros’ Fears
Today we are going to talk about the details of the Roblox data breach and the main outcomes of a recent cybersecurity professionals survey.
11.07
Blog
#Personal data
#Risk management
Why Data Theft Can't be Tolerated – Yet Still it Happens
It’s impossible to completely exclude the possibility of data theft, given the speed with which technology is developing and the volumes of assets going digital. However, the risks can be mitigated.
05.07
Blog
#DLP
#Risk management
#DCAP
Insurance Market Shake-Up & Digital Diary Breach
In this week's IS digest, we will delve deeper into the news about a recent incident and explore the outcomes of new research.
05.07
Blog
#Personal data
#Risk management
(In) Secure Digest: Wiped Out Servers, Phish in Sales, and Summer Leak Season
In our June review, we look at recent information security incidents reported in the media during the first month of summer.
01.07
Blog
#Personal data
#Fraud
#ransomware
Cybersecurity Remains a Top Concern as Professionals Face Burnout
The present news digest explores the main findings of recent research on burnout among cybersecurity experts and the state of smart manufacturing in the automotive industry.
26.06
Blog
#Risk management
#Human factor
#User behavior
Beware of Fakes and Exes
This week’s news digest is about how fired and fake employees can cause disasters.
21.06
Blog
#Human factor
#Internal threat
#Fraud
#Risk management
Check Out Your Password
In our latest cyber news review, we are going to share with you the key takeaways from recent studies on password management habits and ATO attacks.
11.06
Blog
#Risk assessment
#Personal data
#Human factor
Cybersecurity Challenges Revealed by New Research & the Epsilon Case Completion
In this week’s cyber news review, we are going to delve deeper into the recent CDW research findings and the Epsilon case updates.
06.06
Blog
#Internal threat
#Fraud
#Risk management
(In) Secure Digest: IS specialist changing team, biometrics theft by aggrieved contractors and electronic signature platform hack
We have compiled a monthly roundup of high-profile IS incidents that were reported in May.
03.06
Blog
#Fraud
#Confidential documents
#Personal data
A Bunch of Fines for Serious Breaches
In this overview we are reporting on two recent major data leaks, which resulted into loss of troves of data and significant penalties by regulatory authorities.
30.05
Blog
#Compliance
#Personal data
April 2024 Breaks Data Breach Records
In the text below, we will take a closer look at a couple of the recent cyber incidents.
16.05
Blog
#Personal data
#Third party
(In) Secure Digest: the Unprotected Server, the Marine Data Leak and a Supply Chain Attack
In May's edition, we'll reveal: the case of an unscrupulous medical company; accidental data leak caused by the SaaS vendor; consequences of the India's largest electronics manufacturer negligence.
14.05
Blog
#Personal data
#Insider
#Confidential documents
(In) Secure Digest: if There was Darwin Awards in 2024
In April, we traditionally ask our Leading Analyst Sergio Bertoni to share his selection of funny, ridiculous and silly IS incidents.
11.04
Blog
#Personal data
#Confidential documents
#Fraud
How to Select Data Security Solution and not Fall for Marketing
With information security threats on the rise, vendors release a slew of data protection solutions. Sergio Bertoni, Lead Analyst at SearchInform suggests following 4 steps to choose the one easily and avoid mistake.
10.04
Blog
#DCAP
#Risk assessment
#DLP
#Investigation
#Risk management
(In)Secure Digest: Mega Leaks, Deepfakes Calls and Ransomware Attack
In our traditional monthly digest, we've gathered a bunch of recent information security incidents.
01.03
Blog
#Personal data
#Insider
#Confidential documents
8 Dangerous Employees’ Actions Which Endanger Corporate Security
Sergio Bertoni, the Senior analyst at SearchInform reveals typical mistakes basing on the real life stories.
02.02
Blog
#Internal threat
#Human factor
#Risk management
(In) Secure Post New Year Digest: a Surprise Email, an Accidental Leak, Work on Mistakes
The time has come to reveal, what happened while we were on New Year's holidays.
01.02
Blog
#Personal data
#Fraud
Travel Agency and COVID-19 Testing Platform Exposed Client Data
In this article you’ll find details on two notifiable information security incidents.
19.01
Blog
#Database
#Personal data
(In) Secure Digest The New Year Edition: Stolen Code, DNA leaks and Safe Data Leak
In the final digest of 2023, we’ll tell about stealing corporate secrets, putative labourers, genetic information leaks and very vindictive employees.
26.12
Blog
#Former employees
#Fraud
#Risk management
Information Security Trends 2024
Sergio Bertoni, Lead Analyst at SearchInform, shares his thoughts and predictions on the key trends in information security for the year 2024.
25.12
Blog
#Risk management
#Personal data
#Internal audit
Unexpected Findings With the Help of FileAuditor Part 2
The second task of the self-test was to check whether user access rights were distributed appropriately and eliminate violations (in case of detection).
20.12
Blog
#DCAP
#Internal audit
#Personal data
#Blocking
Unexpected Findings With the Help of DCAP Solution, or how did we Performed Audit of our File System Part 1
Today we decided to reveal a few illustrative cases of how we performed audit of our own file storages and share that the statistics, provided by clients, isn’t an exaggeration.
20.12
Blog
#DCAP
#Internal audit
#Personal data
#Confidential documents
Two Recent Information Security Incidents Resulted Into Exposure of Customer Data
Here's another roundup of the latest information security incidents you need to know about today.
14.12
Blog
#Personal data
#Fraud
#Confidential documents
Methods of Enhancing Users' IS Literacy: What is the Safest Password?
In this article, we share our experiences and advice on how to enhance employees’ IS-related competencies.
14.12
Blog
#Risk management
#User behavior
#Risk assessment
Popular Messenger Users’ Data Leaked and Students' Personal Information Exposed
It's time for us to once again report on two recent notable data leaks again.
05.12
Blog
#Personal data
#Confidential documents
#Messengers, social media, apps
Connected Devices Remain the Most Popular Data Leakage Channel
SearchInform together with its partner NEXTA ÇÖZÜM surveyed representatives of 100 Turkish leading companies to find out how their experts ensure data leaks protection, whether they are planning to increase data security budgets and what data channels their security officers consider the riskiest.
04.12
Blog
#Risk management
#Email
#Devices
#Messengers, social media, apps
(In)Secure Digest: The Case of Classic Phishing Attack, Scammers Among the Team and the Dangerous Vulnerability
In this November digest we gathered interesting and illustrative incidents related to data leaks, fraud and hacks.
30.11
Blog
#Personal data
#Internal threat
#Former employees
#Insider
Online Casino Leaked Data and Marketing Agency Fined for Last Year's Incident
Today we report on two more recent information security incidents.
22.11
Blog
#Personal data
#Risk management
#Internal threat
Ways to Ensure Children’s Safety on the Internet: Cybersecurity Experts’ Views and Advice
On the occasion of World Children’s Day, we share an article, containing recommendations and a few tools, which can help to protect children from inappropriate content on the Internet.
20.11
Blog
#Risk management
#Risk assessment
#User behavior
Deepfake Science Basics: How are They Created and how to Detect Them
Alex Drozd, CISO of SeachInform, sheds light on deepfakes and how they are created.
14.11
Blog
#Fraud
#User behavior
#Risk management
Exposure of Data on Popular Singapore Hotel Group Clients and French Torrent Tracker Users’ Personal Details Compromise
Today we invite you to examine two recent major data leaks, exposing the details on hundreds of thousands of individuals.
08.11
Blog
#Personal data
#Internal threat
#Risk assessment
(In)Secure Digest: a Leak via Contractor, Hack of Airline and Case of Corporate Fraud
At the end of the month, traditionally, we’ve gathered a selection of high-profile IS incidents.
01.11
Blog
#Personal data
#Insider
#Internal threat
Casio and Redcliffe Labs Data Leaks Expose Customer Information
Today, let's examine the incidents those resulted in the disclosure of customer information at two large companies.
27.10
Blog
#Personal data
#Risk management
#Risk assessment
Which Aspects of Information Security it’s Crucial to Address for SMEs?
Learn more about the methods of cyber-attacks that SMEs owners should be aware of.
26.10
Blog
#Risk management
#Risk assessment
#Compliance
Film Festival Website Leak and Data Theft by Former Employee
Once again, we've rounded up two information security incidents worth knowing about with a short report to keep you informed.
19.10
Blog
#Personal data
#Insider
#Former employees
Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?
Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.
13.10
Blog
#Risk management
#Internal audit
#Risk assessment
#Compliance
Tax Details of the Wealthiest Americans Leaked and Billions of Passwords Exposed
We've rounded up two data leakages in the new report on recent data related incidents.
05.10
Blog
#Personal data
#Risk management
#Internal threat
#Former employees
A Case in Point: You’ve got Mail
Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.
03.10
Blog
#Email
#Insider
#Fraud
(In)Secure Digest: Pizza Lovers' Data Theft, a Million-dollar Fine and Aircraft Suppliers’ Data Leak
It's time for the traditional monthly review of "classic" and non-trivial IS incidents reported by the media.
03.10
Blog
#Personal data
#Internal threat
#Risk assessment
#Fraud
Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed
In this article we will examine, DLP class systems reproaches are fair and which ones are unfair and will reveal, which limitations are typical for all DLP systems and which are in fact disadvantages of some specific products.
29.09
Blog
#DLP
#Risk management
#Risk assessment
E-mail Compromise: How to Protect Business Against BEC-attacks
The senior analyst at SearchInform, Sergio Bertoni reveals, why BEC attacks are so popular and how to protect against them.
27.09
Blog
#Email
#Fraud
#Risk management
38TB Private Data Leak and $9,000 Fine for 7 Years of Customer Data Exposure
In a new roundup of recent information security incidents, we examine two more cases of inadvertent disclosure of private information.
20.09
Blog
#Personal data
#Risk management
#Risk assessment
How to Train Employees in Information Security Related Issues Efficiently
In this article, Sergio Luis Bertoni, Leading Analyst at SearchInform will share my observations, based on the practical experience in the sphere of educational courses development.
18.09
Blog
#Risk management
#Human factor
#Internal threat
A Case in Point: Set a Search Rule to Catch a Thief
It's time to present a compelling case study that underscores the criticality of maintaining comprehensive visibility into your organization's file system.
15.09
Blog
#Personal data
#Insider
#Fraud
#DCAP
Ransom Demand for Human Error and Two-year Data Leakage
Today we will examine two recent instances of data disclosure, both of which, as is often the case, have resulted in serious financial and reputational losses for the companies involved.
13.09
Blog
#Internal threat
#ransomware
#Fraud
Leaked personal data of more than 500,000 employees and an unprotected 4GB database
Today you will learn about the data leak of over 500,000 employees from a major clothing retailer and the 4GB open database from a popular digital publisher.
08.09
Blog
#Personal data
#Internal threat
#Database
(In)Secure digest: “shadowy” Amazon, de-anonymization of Northern Ireland police officers and pseudo-hackers
In our traditional (in)Secure digest we’ve gathered news on the recent leaks.
31.08
Blog
#Personal data
#Fraud
#Internal threat
Two recent incidents involving inadvertent personal data exposure
In our new report on recent information security incidents, we examine two cases of inadvertent disclosure of personal data.
30.08
Blog
#Personal data
#Former employees
#Internal threat
#Insider
Two recent insider incidents: Tesla and Jefferson Health affected
It's time for another roundup of recent information security incidents. Today we're going to reveal details of the Tesla insider incident and the alleged patient data compromise at Jefferson Health.
24.08
Blog
#Personal data
#Former employees
#Insider
SearchInform SIEM system – out-of-the box analytics and proactive incident management
Employees in charge of numerous organizations worldwide tend to understand the necessity to implement a SIEM class solution, which detects security events within the digital infrastructure.
21.08
Blog
#Risk management
#Internal audit
#Risk assessment
The revenge of a bank employee and a fine of 74,400 dollars for a human error
Today, we're going to examine two recent data leak incidents caused by employees.
18.08
Blog
#Personal data
#Human factor
#Internal threat
The number of victims of the MOVEit vulnerability continues to grow: two recent major data leakages
Today, we are going to report on two recent data leakages caused by the well-known MOVEit Transfer attack.
16.08
Blog
#Third party
#Personal data
#Risk management
Bunch of new personal data leak incidents: police officers and hospital patients affected
In this report we reveal details on the recent major data related incidents: exposure of hospital patients’ and police officers’ personal data.
11.08
Blog
#Personal data
#Human factor
#Third party
Major data leak incident resulted into exposure of Students, Teachers, and School Staff members’ personal Information in the United States, the Caribbean and Latin America
Today we're examining an alarming incident that resulted into exposure of over 680,000 records.
04.08
Blog
#Database
#Risk management
#Risk assessment
(In)Secure Digest: a patented data leak, Bangladeshi open register and water treatment plant hack
The time has come to find out if July was full with information security incidents. In our traditional digest we've gathered the most memorable incidents.
03.08
Blog
#Risk management
#Insider
#Former employees
#Personal data
A case in point: The thirst for revenge
Over the years of working, we have collected a large number of interesting cases. Some of them are amusing, some of them are surprising, but most of them has prevented serious losses for our clients. So, we figured: Why not share them with you?
14.07
Blog
#Internal threat
#Risk assessment
#Risk management
#Insider
Sabotage of a water treatment facility: a former employee endangered the health of thousands of people
We often report on incidents involving former employees. This time it is an incident that could have had serious consequences not only for the company itself but also for a large number of people.
12.07
Blog
#Former employees
#Risk management
#Risk assessment
Exposure of 61,000 private addresses and one more email error
This week we will look at two incidents that have affected thousands of people by exposing their personal information.
06.07
Blog
#Risk assessment
#Risk management
#Email
#Personal data
Human Vulnerabilities in Cyber Security
As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.
03.07
Blog
#Risk assessment
#Risk management
#Third party
(In)Secure Digest: theft of national secrets, a rogue VPN, and a fine for security guards' curiosity
Here's our monthly roundup of noteworthy information security incidents from June.
29.06
Blog
#Personal data
#Internal threat
#Former employees
Implementation department specialists' workdays: millions of questions and the requirement to know literally everything
Implementation department employees can help customers to quickly manage to work with our solutions and benefit as much as possible from the software usage.
27.06
Blog
#Risk management
#Human factor
#DLP
#Internal audit
MSSP vs MDR
MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.
21.06
Blog
#Risk assessment
#Risk management
#Compliance
Inadvertent disclosure of personal information
The Public Appointments Service accidentally leaked the personal data of 15,471 candidates for public jobs.
20.06
Blog
#Personal data
#Risk management
#Risk assessment
Risks of neural networks and chat bots usage
SearchInform expert reveals artificial intelligence usage related risks and shares advice on how to mitigate them.
19.06
Blog
#Human factor
#Risk management
#Machine learning
One more victim of MOVEit application vulnerability and exposure of data on 260,000 car owners
Learn more about two recent data incidents, which affected Toyota and Prudential subsidiaries' clients.
15.06
Blog
#Personal data
#Cloud
#Database
Major data incidents and large penalty for data privacy violation
Learn more about a few recent major data related incidents.
08.06
Blog
#Personal data
#Confidential documents
#Compliance
How to put on a vacation
We implement a few strategies to ensure secure access and help employees not to forget all the IS rules while they're on the road. Let's have a look at the checklist and find out, how we do it.
05.06
Blog
#DCAP
#DLP
(In)secure digest: data leaks with mileage, refuse to use AI and hack of an account
The time has come for our traditional gather of so-called classic and extraordinary information security incidents, which were reported by mass media.
31.05
Blog
#Personal data
#Internal threat
#Third party
Recent data privacy incidents
A data leak and massive phishing attack on social network users.
27.04
Blog
#Personal data
#Confidential documents
#Database
Risk Management Certification
Let's consider one of the most significant frameworks for managing risk is ISO 31000, an international standard that provides principles, best practices, and guidelines for managing risk in organizations.
24.04
Blog
#Risk management
#Risk assessment
#Compliance
Leak and misuse of clients’ personal data
Details on a few incident related to violation of clients’ privacy.
12.04
Blog
#Personal data
#Confidential documents
#Human factor
The new portion of significant data incidents
Recently details on a number of tremendous data related incidents were exposed.
07.04
Blog
#Confidential documents
#Insider
#Human factor
More than half of companies limit their protection with nominal information security literacy
A research on how companies prefer to train employees in information security and what methods do they implement
06.04
Blog
#Human factor
#Compliance
#Risk management
(In)Secure digest: if there was the “Darwin Award” in information security sphere – 2023 edition
In this April compilation, you’ll find details on aquarium fraudsters, the financial manager, who squandered the company's money, "super-secure" apps, but something went wrong with them and much more.
05.04
Blog
EPP vs EDR
What is the difference between EPP and EDR? Do they complement each other or they should be used separately?
31.03
Blog
#Risk management
#Risk assessment
A new portion of fines for inadequate data protection
Details on a few cases when companies, which failed to implement adequate data protection were fined.
29.03
Blog
#Personal data
#Confidential documents
PCI certification
PCI DSS and PCI Certification: All You Need to Know
29.03
Blog
#Personal data
#Compliance
#Confidential documents
Certified Risk and Information Systems Control (CRISC)
Сybersecurity and risk management certification: ISACA and ISC
27.03
Blog
#Risk management
#Risk assessment
Best Digital Forensics Certifications
The article helps you answer the three most important questions when choosing the right IT security and digital forensics certification.
24.03
Blog
#Internal audit
#Fraud
#Investigation
A bunch of data leak incidents has hit large enterprises
A few large companies and organizations has recenly experienced data related incidents.
22.03
Blog
#Personal data
#Confidential documents
#Third party
#ransomware
#Investigation
Australian companies have experienced large data privacy incidents
Australian large company Latitude Financial, involved in the financial industry and IP firm IPH have experienced data privacy incidents.
16.03
Blog
#Personal data
#Confidential documents
Large troves of tech giants’ data leaked
Recently, ACER and Acronis companies’ have experienced massive data related incidents.
10.03
Blog
#Confidential documents
#Database
Large retailer employees’ data leaked
WHSmith, British retailer has experienced an incident, which led to employees’ personal data leak.
07.03
Blog
#Personal data
#Database
(In)secure digest: enormous data leaks and insider’s revelations
The time has come to discuss major data realted incidents, which happened in February.
02.03
Blog
#Personal data
#Confidential documents
#Database
A famous video game publisher has recently experienced an alleged data related incident
An unidentified intruder has exposed Activision employees’ data. Overall, nearly 20.000 recordings were made publicly available.
01.03
Blog
#Confidential documents
#Database
#Personal data
Which sources should be controlled by the SIEM system first of all?
It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.
22.02
Blog
#Risk assessment
#review
AI media manipulation service has leaked large trove of users’ data
AI photo editor Cutout.pro users’ data was leaked. Overall, 9 GB of generated pictures and other data was exposed.
21.02
Blog
#Personal data
#Encryption
What Are the Major Security Threats That Can Be Expected Through an Email?
Learn more about the email risks and how to counter them.
16.02
Blog
#Email
#Risk management
#Fraud
The SearchInform DLP deals with the smartphone threat
Learn how the SearchInform DLP functionality helps to detect, whether an insider has a smartphone in hands.
16.02
Blog
#Internal threat
#Insider
#Employee monitoring
#Risk management
#Database
Fizzy giant manufacturer experienced a data related incident
Pepsi Bottling Ventures LLC data was illicitly obtained and extracted because of deployment of info stealer malware.
15.02
Blog
#Personal data
#Confidential documents
#Investigation
The SearchInform DLP detects phishing and why would you need this functionality in the DLP class tool?
Learn how the atypical DLP functionalty enhances your corporate protection.
13.02
Blog
#DLP
#Email
Data privacy incident in the healthcare sector
Details on a cybersecurity incident in the healthcare sector became publicly known recently.
09.02
Blog
#Personal data
#Confidential documents
#Third party
An alleged massive data leak affected fashion retailer's customers
Clients' data was probably stolen in a data privacy incident
02.02
Blog
#Personal data
#Database
(In)secure post New Year digest: “temporary” failures, corporate insider and data on everyone
The time has come to discuss what happened while we were on a vacation.
02.02
Blog
#Database
#Employee monitoring
#Insider
Sportswear manufacturer clients' personal data has been allegedly leaked
Puma clients' personal data has been exposed.
25.01
Blog
#Personal data
#Database
#Investigation
Email marketing service hacked
MailChimp mail service was hacked… again
19.01
Blog
#Insider
#Email
Details on some data related incidents were disclosed recently
A brief overview of two December data-related incidents
16.01
Blog
#Personal data
#Messengers, social media, apps
SIEM: Use Cases
We will examine more precisely top SIEM use cases.
04.01
Blog
#review
#Risk assessment
#Compliance
UEBA: Use Cases
UEBA systems and reveal their peculiarities
03.01
Blog
#User behavior
#Human factor
#Employee monitoring
Private Belgian bank experienced an insider incident
The serious data related incident happened with the Degroof Petercam.
27.12
Blog
#Former employees
#Insider
#Personal data
Large fines are imposed on game developer for data related incidents
The Epic Games, developer of Fortnite videogame is fined $520 million.
23.12
Blog
#Personal data
#Fraud
Update on the Last Pass data related incident
The data leak, which happened in August turned out to be much more serious that it was believed initially.
23.12
Blog
Resonant cases of data leakages in APAC region
There is a step change taking place in the number of data-related incidents and that is critical.
22.12
Blog
#Employee monitoring
Data on 5.6 million users exposed
Social Blade, the American social media analytics service has experienced a massive data related incident.
20.12
Blog
Uber experienced another data related incident
Uber experienced one more data related incident. However, no link between the September incident and this one has been established.
14.12
Blog
The “misalignment of databases” resulted into a massive data related incident
A large data related incident has recently affected Australian telecom giant Telstra clients.
12.12
Blog
In(secure) digest: lost accounts, compensations for mega leaks and “quick as the wind” leaks
This time we’ve gathered data on serious incidents: attacks on large companies, phishing, forgetful employees, whose actions led to the loss of clients’ data.
01.12
Blog
#ransomware
#Third party
#Human factor
A few personal data related incidents details have become known recently
A brief overview of a few data related incidents.
23.11
Blog
Notifiable Privacy Breaches
What is required to do if a data breach incident somehow takes place?
22.11
Blog
#Compliance
#Personal data
#DLP
MSSP Business Model
What is MSSP? When and for whom is it helpful?
21.11
Blog
#Employee monitoring
#Risk management
#Compliance
Cyber Threats to National Security
National Cybersecurity: this is how the cyber threat has intensified
18.11
Blog
#ransomware
#Risk assessment
Recent data leak incidents
A brief overview of two recent data leak incidents.
18.11
Blog
Booz Allen Hamilton Holding Corporation experienced a data breach
Due to insider's actions some personally identifiable information was exposed in a recent incident.
14.11
Blog
#Insider
#Internal threat
#Personal data
#DCAP
What Are the Major Security Threats That Can Be Expected Through an Email?
Typical email threats and how to counter them
07.11
Blog
#Email
#ransomware
Data Loss Prevention Use Cases
This article will help you to learn how to avoid losing data.
04.11
Blog
#DCAP
#DLP
#Human factor
Benefits of Managed Security Services
How to implement efficient information security protection with MSSP?
02.11
Blog
in(Secure) digest: stellar social engineering, exposed servers and giants under attacks
The most resonant information security incidents in our October digest.
01.11
Blog
#Personal data
Cybersecurity Statistics
Numerous cybersecurity issues: serious threats to businesses
28.10
Blog
#Human factor
#ransomware
#Risk management
Recent Cyber Incidents
Rise in ransomware attacks and global threats
27.10
Blog
#DLP
#Fraud
#ransomware
Famous Data Breaches
General Data Protection Regulation, fines, real cases.
26.10
Blog
Insider Threat Awareness
Types of insider threats and insider threat mitigation.
25.10
Blog
#Insider
#Employee monitoring
#Human factor
Recent Security Breaches
Young employees, zero trust security and other security breach risks.
24.10
Blog
#Employee monitoring
#ransomware
#Third party
Healthcare Cyber Attacks
What makes healthcare organizations a popular target for cyber attacks?
21.10
Blog
#Compliance
#Personal data
#ransomware
Financial Fraud Cases
The biggest investment fraudsters
20.10
Blog
#Fraud
Leaked Credit Card
The most significant cases.
19.10
Blog
#Personal data
#Third party
#Email
Best Network Security Software
What should you look for when choosing a provider of best network security software?
18.10
Blog
#Risk assessment
#Risk management
Retail online marketplace clients' data leak
Recently, data on 2.2 million customers of Australian retail markeplace has leaked
18.10
Blog
(in)Secure digest: boredom motivated attacks, love to fines and ethical hack
We’ve compiled a selection of information security incidents, which became publicly known in September.
17.10
Blog
#Risk management
#Human factor
#Investigation
Cybersecurity Report
The biggest challenges and greatest threats in IT security.
17.10
Blog
#Human factor
#ransomware
#Employee monitoring
Fraud Cases
How to detect some common types of fraud and what may you do about it
14.10
Blog
#Fraud
#Risk assessment
#Human factor
Car manufacturer clients' data exposure incident
An inappropriate method of code storage has resulted into a data exposure incident
13.10
Blog
#Personal data
#Database
#Human factor
Outsourcing Security Services
Internal and external information security personnel
05.10
Blog
#Risk management
#Compliance
Cybersecurity Threats and Issues 2022
Records and trends in cybersecurity.
04.10
Blog
#ransomware
#Personal data
#Compliance
Cyber Attacks on Critical Infrastructure
Critical infrastructure: current situation and best cybersecurity practices
03.10
Blog
#DLP
#Risk assessment
#Employee monitoring
Best Practices for Network Security
The ultimate guide to securing your industrial network using the best network security practices
30.09
Blog
A large database with personal data has been leaked
A 6GB database, which allegedly contained personal information on 16 million users has been leaked.
30.09
Blog
Cybersecurity Investigations
What is required to conduct a cybersecurity investigation
29.09
Blog
#Investigation
#Insider
#Risk assessment
Examples of Cybercrime Cases
What is cybercrime and examples of a few biggest cybercrimes
27.09
Blog
#Fraud
#ransomware
#Email
#Personal data
Biggest Cyber Attacks in History
An overview of some of the most notorious cyberattacks
26.09
Blog
Australian telecom breached
Australian telecommunications company breach turned out to be one of the biggest cyberattack in Australian history
23.09
Blog
Emerging Cyber Threats
An overview of cyber threats, endangering companies and organizations worldwide in 2022.
22.09
Blog
#Human factor
#Fraud
#Insider
#Internal threat
#Email
Data Privacy Day
What is The European Data Protection Day and why data privacy is so important
19.09
Blog
Сryptocurrency insider incident and “the great data exfiltration”
An insider case in cryptocurrency sphere and "The great data exfiltration"
16.09
Blog
#Internal threat
#Insider
#Personal data
#Human factor
Top 10 Cybersecurity Threats
What are the bigget information security threats this year?
15.09
Blog
#Insider
#Email
#Fraud
#Human factor
Best SIEM Tools
What is a SIEM system and how to choose one?
14.09
Blog
#Risk management
#Compliance
Worst Data Breaches
Prerequisites and consequences of data breaches
14.09
Blog
Biggest Corporate Frauds
An overview of some biggest cases of corporate frauds in history.
13.09
Blog
#Fraud
#Personal data
#User behavior
Best Endpoint Protection
What is an efficient endpoint protection and a slight overvierw of best solutions.
05.09
Blog
#Devices
#Fraud
#Blocking
#Risk management
Best Computer Security Protection
How to ensure best computer security protection?
05.09
Blog
#Devices
#Fraud
(In)secure digest: the smell of data leaks, deep fake in the Zoom and an option of becoming the nobility member for only €1000
In August many employees are still on a vacation, however, this doesn’t refer to fraudsters, judicial and law enforcement system representatives.
01.09
Blog
#Personal data
#Fraud
#Human factor
Onetwotrip ticket booking system users’ data leak
Onetwotrip clients' data leaked
24.08
Blog
#Personal data
#Fraud
The ugly in the realm of beautiful, two new personal data leaks’ details revealed
Detail of two more data leaks revealed
23.08
Blog
#Personal data
#Confidential documents
#Fraud
Microsoft credentials leak
Internal login credentials were accidentally uploaded to the company’s own infrastructure on GitHub.
18.08
Blog
#Internal threat
#Human factor
#Confidential documents
Internet-marketing giant clients’ data leak
Klaviyo clients' data leak took place because of phishing attack
11.08
Blog
Insider Threat Statistics for 2022 The seriousness of insider threat
What is an insider threat and who is an insider? What types of insider threats exist? How to detect an insider threat and what is required to do in order to mitigate risks? You may refere to the article and find out.
11.08
Blog
#Insider
#Risk assessment
#Internal threat
#Human factor
A real fortune was made on phone unlocking and unblocking
An American resident managed to earn $25 million by a phone unlocking and unblocking service.
04.08
Blog
#Insider
#Fraud
(In)secure digest: lawsuit for leaks, insidious phishing and record leak of personal data
The time has come to discuss if July was full with cyber incidents.
29.07
Blog
#Risk management
#Personal data
#Investigation
#Confidential documents
Significant fines are imposed due to information security incidents
Recently, plenty of news on fines imposed due to information security incidents have been published. Let’s have a look at a few significant cases, which took place lately.
25.07
Blog
#Personal data
#Investigation
Confidential documents and personal data leaked due to an insider activities
Central Florida construction firm has recently experienced a data breach. An employee stole a massive of confidential data just before resignation.
22.07
Blog
#Risk assessment
#Internal threat
#Risk management
#Personal data
#DLP
#Investigation
#Confidential documents
The infamous data leak of Chinese citizens’ personal data
Details of one of the biggest data leak ever.
19.07
Blog
#Personal data
#Database
#Confidential documents
#Third party
Razer data breach case: a claim against IT solution provider is filled
Due to a security misconfiguration by third-party IT-solution provider, Razer's client's data was at a stake of being exposed.
15.07
Blog
#Personal data
#Database
#Third party
Sensitive Data Of Colorado Springs Utilities Clients Leaked
Colorado Springs Utilities notified their customers via email that sensitive data was obtained by an “unauthorized party”. The problem appeared to be on a subcontractor side. The name of the company remains unrevealed due to “security reasons”.
15.07
Blog
#Third party
#Personal data
#Database
Demotivation for intruders: no more ransom payments
Recently the National Cyber Security Centre (NCSC) and the Information Commissioners Office (ICO) published a joint letter, addressed to the Law Society.
14.07
Blog
#ransomware
Exposure of 23 million users’ data
Due to the dangerous misconfiguration of a third-party database owner, personal data of 23 million users was exposed.
11.07
Blog
#Personal data
#Confidential documents
#Third party
(In)secure digest: personal data newsletter, hacked state services and endangered farmers
The time has come to reveal some “classic” and non-trivial information security incidents. As usual, we’ve gathered some of the most impressive cases of the month in our digest.
07.07
Blog
Insider incident affected nonfungible token (NFT) marketplace
This time, one of the largest nonfungible token (NFT) marketplace experienced an insider related data leak.
05.07
Blog
Avaya system administrator: illegal licenses generating and selling
Avaya system administrator was accused of fraud. It was stated that together with accomplices he sold software with additional options for IP-ATC. The overall sum of their financial operations exceeds $88 million.
29.06
Blog
#Fraud
#Insider
#Internal threat
Another personal data leak CafePress clients affected this time
CafePress got its consumers’ sensitive personal data, including Social Security numbers, exposed. The claim against Residual Pumpkin Entity, former owner of CafePress and PlanetArt, current owner of CafePress was filled by the Federal Trade Commission. The main issue of the claim is that the organization had failed to ensure safety of client’s personal data (including Social Security numbers), and covered up the data breach.
27.06
Blog
#Personal data
#Confidential documents
Important trends in corporate security
In this article we continue to deal with the topic of corporate security, and we’ll provide a slight overview of some information security trends and advice on how top-managers may eliminate the ongoing risks.
21.06
Blog
Another data leak in the healthcare sphere
Choice Health Insurance database leak, caused by human error took place recently.
15.06
Blog
#Human factor
#Personal data
#Database
#Third party
Massive database exposed to public access
Another data leak has taken place recently. About 60 GB of data has been exposed to public access.
07.06
Blog
#Personal data
#Database
#Confidential documents
#Third party
General Motors clients’ personal data was obtained by intruders
General Motors, one of the leading car manufacturer accepted the fact, that last month cybercriminals managed to conduct the credential stuffing attack.
25.05
Blog
#Fraud
#Confidential documents
#Third party
Excessive data supplement
According to newest research, people are becoming more conscious in their work with data. Still, a lot of excessive data is transmitted.
18.05
Blog
#User behavior
#Messengers, social media, apps
#Email
More than 60% of companies affirmed breach experience in last year
Internal risks are still underestimated.
26.04
Blog
#Investigation
#Internal threat
#Confidential documents
#Insider
#Personal data
#Human factor
New concept of organization’s security
It seems that the time has come to elaborate new approach to the concept of organization security
20.04
Blog
#Internal audit
#Human factor
#User behavior
#Remote employees
#Devices
#Risk management
#Risk assessment
Apple releases patches for 0-Days in MacOS and iOS
Dangerous zero-day vulnerabilities are eliminated by Apple.
15.04
Blog
#Devices
#Risk assessment
#Risk management
#ransomware
The new post-quantum cryptography standards are to be announced soon
New era in post-quantum cryptography standards.
15.04
Blog
#Cloud
#Encryption
#Risk assessment
#Personal data
#Risk management
According to Bloomberg, in the middle of 2021 Apple, Meta and Discord staff sent hackers their clients’ data
Users' personal data was sent hackers by mistake.
08.04
Blog
#Personal data
#Third party
#Messengers, social media, apps
I resolve to… leave those security errors for good in 2021
The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled
27.12
Blog
#Risk assessment
#Risk management
#Investigation
Why dismissed employees take revenge and what prevention measures to implement
Revenge hacks and what prevention measures to take.
17.12
Blog
#Risk assessment
#Former employees
#Human factor
Major outage and government employee data breach
Ransomware keeps surfing the wave of ever-presence
15.12
Blog
#ransomware
#Third party
#Personal data
Business continuity and information security integration
How to make security part of a general risk prevention and mitigation program
13.12
Blog
#Risk management
#Risk assessment
#Investigation
Vestas got its personal data affected
The data has allegedly been shared with third parties.
10.12
Blog
#Personal data
#Third party
#Risk management
French public transport company tackles a major data breach
RATP data has been exposed via an unprotected server.
07.12
Blog
#Risk management
#Personal data
#Confidential documents
The hacker turned out to be the former employee
Ubiquity has gone through a curious case
03.12
Blog
#Former employees
#Employee monitoring
#Risk management
Panasonic is recovering from a 4-month exposure
The company detected the incident only after a discovery of an extreme network traffic.
01.12
Blog
#Risk management
#Confidential documents
#Investigation
More data sent to dark web
The sourse of the incident is still being explored.
29.11
Blog
#Fraud
#Confidential documents
#Risk management
Major fraud cases in healthcare revealed this year
Pfizer discovers an insider working for a competitor, whereas Genentech hit the news with a deep-rooted story months ago.
26.11
Blog
#Insider
#Risk management
#Fraud
Government employee helped violators to access data
Otario immunisation system has launched investigation and found an insider.
24.11
Blog
#Employee monitoring
#Internal threat
#Personal data
When your sellers obtain your data
Amazon program was misused by its sellers, and data was intended for rankings boosting. California Pizza Kitchen announces a data employee breach.
19.11
Blog
#Third party
#Personal data
#Cloud
Robinhood employee tricked by social engineering
7 million users got their data affected in the breach announced by Robinhood.
10.11
Blog
#Internal audit
#Third party
#Personal data
What kind of DLP system do you need in 2022?
David Balaban reflects on the DLP vendors' race for attention, adding of new features, sometimes going beyond the boundaries.
08.11
Blog
#DLP
#Investigation
#Human factor
Oregon state failed to ensure employees' privacy
And seemingly made it deliberately, at least according to the plaintiffs.
29.10
Blog
#Confidential documents
#Personal data
#Human factor
Throckmorton Country Memorial Hospital and Marten Transport face data breach
The recent news might be another case to add to the list of ransomware notches
28.10
Blog
#Personal data
#Investigation
#ransomware
Ransomware attacks keep companies on alert
The amount isn't disclosed as the hackers' groups haven't received the companies reaction yet
25.10
Blog
#Third party
#Investigation
#Internal audit
#ransomware
Acer offices in Taiwan hacked
This year the company has already faced a major incident as they were to pay a $50-million ransom.
21.10
Blog
#Database
#Risk management
#Personal data
Credit monitoring as most popular offset against data breach
Organisation still lack basic information security solutions.
20.10
Blog
#Risk assessment
#Confidential documents
#Third party
The more they know the less they care
More and more people are unwilling to share their personal data with third parties
18.10
Blog
#Messengers, social media, apps
#Personal data
#Third party
Facebook security upgrade decision leaked
The company decided to exempt a number of employees from groups which have access to internal message boards.
15.10
Blog
#Messengers, social media, apps
#Risk management
#Third party
Former employees took company's security issue to court
The company's staff is aware of what information security is, and disregard to data safety decreases the loyalty of workers.
07.10
Blog
#Employee monitoring
#Internal threat
#Risk management
How to tell the difference between a phishing email and a real one?
Don't become a phisher’s target, it's avoidable.
07.10
Blog
#Email
#Risk management
#Personal data
Multi-party breaches vs third-party related incidents
Ripple events are nearly untraceable and affect hundreds of companies
30.09
Blog
#Third party
#Risk management
#Confidential documents
Security research based on Indian SME recent experience
Malware attacks are on the rise
29.09
Blog
#Risk assessment
#Risk management
#Confidential documents
Afghan interpreters' data leaked due to an employee's mistake
The incident is gaining resonance
24.09
Blog
#Email
#Personal data
#Employee monitoring
Data overexposed in manufacturing sector
The relevant statistics and most common security issues in 2021 so far
21.09
Blog
#DCAP
#DLP
#Confidential documents
When a hack might be not such a bad thing
…where the bad and the good are twisted.
16.09
Blog
#Database
#Personal data
#Employee monitoring
Users are monitored by gadgets Should we turn down everything digital?
Who should you trust in a digital world?
15.09
Blog
#Devices
#Third party
#Messengers, social media, apps
Government sector faces human factor data breach issue
Australian public sector is concerned with the growing number of information leakage episodes due to employee mistakes.
14.09
Blog
#Employee monitoring
#Confidential documents
#Risk management
Dallas schools compromised by a city IT employee
Whereas a disgruntled former employee's case was brought to the court.
08.09
Blog
#Confidential documents
#DCAP
#Cloud
Bangkok Air dashes the ransom offer aside
The popular airline has declined the gang's demand
31.08
Blog
#Personal data
#Database
#Employee monitoring
How to configure DLP and not to overlook a leak
How efficient are DLP systems with preset configurations? Can a system be configured once and for good? Learn how to adjust the settings here.
30.08
Blog
#DLP
#Employee monitoring
#Risk management
Former employees and foolhardy ransomware attackers
Several information security incidents which have happened recently are all based on utter carefreeness
27.08
Blog
#Former employees
#Employee monitoring
#Fraud
Data breach cost rises in South Africa, ransomware incidents grow in Australia
Ransomware-related data breaches rose by 24%, the cost of a breach - by 15%.
24.08
Blog
#Risk assessment
#Personal data
#Human factor
T-Mobile hacked for the 5th time
The unauthorized access was detected a few days after a number of customers got their data affected.
17.08
Blog
#Investigation
#Database
#Devices
Russian officials obliged to use only domestic messengers
Ministry of Digital Development prepares a regulatory framework for transferring state employees to state-owned platforms by December 2021.
11.08
Blog
Tokyo visitors' data affected
Olympics ticket holders and event volunteers' details have been compromised
27.07
Blog
#Personal data
#Risk management
#Risk assessment
Does an identity theft has an end or any terms?
Education workers of the Francophone Sud School District are dealing with identity theft.
26.07
Blog
#Risk management
#Personal data
#Risk assessment
Will or won't paying ransom be made illegal?
Another surge of ransom attacks makes the necessity to remind how slippery the way to deal with them is if you choose to pay.
20.07
Blog
#Risk management
#Risk assessment
#Compliance
DarkSide behind Guess breach
The famous fashion retailer Guess has officially announced a data breach comprising details of 1,300 people,
14.07
Blog
#DCAP
#Personal data
#Database
Air India is asked to recompense the breach
The affected customers might be given more than $400,000 for having their data impacted.
06.07
Blog
#Personal data
#Database
#Risk management
Call a hacker - he'll tell you about a breach
Don't have enough information about how the data breach occurred? Speak with the hacker who let it happen.
30.06
Blog
#Messengers, social media, apps
#Personal data
#Fraud
Treasurer’s office vs. mayor
Westfield clerk treasurer's office brought the case regarding the city's mayor act to court
24.06
Blog
#Investigation
#Internal audit
#Third party
Untimely breaches
...or why a law firm can't be trusted
18.06
Blog
#Third party
#Risk management
#Database
JBS chose to pay ransom
JBS, the largest meat producer, paid a $11 million ransom, according to Andre Nogueira, chief executive of Brazilian JBS SA’s U.S. division
15.06
Blog
#Human factor
#Internal threat
#Risk management
Euro 2020 fraudulent websites
It has been recently explored that since the beginning of the year there have been 130 new domains registered – all related to EURO 2020 (EURO 2021) tickets.
10.06
Blog
#Fraud
#Personal data
#Risk management
Top 5 actions to be taken by CEO to increase cybersecurity
Top 5 actions to be taken by CEO to increase cybersecurity and employee trust in the company
08.06
Blog
#Employee monitoring
#Risk assessment
#User behavior
Trello boards indexed by major search engines put at peril business processes of Russian companies
Almost a million Trello boards, thousands of which contain corporate data of large and small Russian companies, were publicly available.
04.06
Blog
#User behavior
#Messengers, social media, apps
#Risk management
UK Special Forces soldiers aren't sure in their data safety
Over 1,000 UK Special Forces soldiers got their data exposed. The document containing their personal data was distributed via WhatsApp.
04.06
Blog
#Personal data
#Confidential documents
#Human factor
Microsoft is going to gather cyber security specialists in the APAC region
The APAC countries are concerned about growing information security risks
02.06
Blog
#Risk management
#Risk assessment
#Investigation
Not all DLP systems are equally helpful
How to choose a system and not to get disappointed
27.05
Blog
#DLP
#Risk management
#Internal audit
Targeting human vs. hacking software
85% of data breaches are the cause of targeting people, not software
21.05
Blog
#Human factor
#Fraud
#Employee monitoring
Why FileAuditor? SearchInform customer gives an elaborate answer
SearchInform customer – scientific technological pharmaceutical company Polysan – has deployed FileAuditor, a DCAP system, and shared the first impression with the company.
19.05
Blog
#DCAP
#DLP
#Internal audit
Why is it important to control third-party security policies?
According to the recent report it seems that roughly half of companies don't know how to deal with third-party security
18.05
Blog
#Third party
#Compliance
#Risk management
A "remote" reminder
Don't set it loose when it comes to data security
13.05
Blog
#Remote employees
#DLP
#Risk management
Microsoft threat and database security time bomb
Companies using Microsoft 365 might jeopardise their data safety and be more vulnerable than those who don't. 19 petabytes of data are exposed right now according to CyberNews.
13.05
Blog
#Database
#Cloud
#Risk management
Outsourcing the role of information security officer
A piece of insight into infosec as an MSSP solution
23.04
Blog
#Risk assessment
#Internal audit
#Cloud
Order in your files and folders: how to organize access control and protection against leaks
Expansion of the IT infrastructure complicates controlling who accesses, copies, moves from folders, and deletes information.
20.04
Blog
#review
#DCAP
Was there a breach?
Companies refuse to admit leakage accusing announcers of misleading its readers.
16.04
Blog
#Personal data
#Messengers, social media, apps
#Compliance
Better employee experience from security viewpoint
What should be done to ensure it?
14.04
Blog
#Remote employees
#Risk management
#Risk assessment
(In) Secure digest: the hit parade of the most comical infosecurity incidents
The most comical infosecurity incidents to laugh and learn from it. Enjoy, but tread carefully!
07.04
Blog
#Investigation
#Fraud
#Human factor
Blocking that does not slow down business processes
Interview with Sergey Ozhegov, CEO of SearchInform
05.04
Blog
#Blocking
#Risk assessment
#Internal threat
All about invisible DLP control and where its invisibility ends
The DLP doesn’t function in a hidden mode for nothing: on the one hand, it doesn’t interfere with the work of respectable employees, on the other hand, it helps to catch insiders off guard.
02.04
Blog
#Employee monitoring
#Risk management
#DLP
Fraudsters won’t miss a chance — what threats to people and business remain in 2021
The “Roaring 20s” is no longer a euphemism from the last century, in the 21st the new decade also began loudly.
31.03
Blog
#Employee monitoring
#Risk assessment
#Risk management
How to detect an employee accepting kickbacks using DLP?
Proven schemes for searching for corrupt individuals in the company.
24.03
Blog
#Fraud
#Risk assessment
#Internal threat
Shell goes through a data breach
Accellion service the company uses got destabilised by a hack
23.03
Blog
How to surf the flow of information security events: use SIEM system correctly
Security Information and Event Management works on the principle of video surveillance.
26.02
Blog
#Risk management
#Internal threat
#Devices
Clubhouse might be an issue
What are the chances of it turning into a Clubhole
24.02
Blog
#Messengers, social media, apps
#Personal data
#Human factor
Why is the Telegram bot allowing you change Caller ID dangerous?
Telegram bot and the growing number of scammers
21.02
Blog
#Messengers, social media, apps
#Risk management
#Human factor
(In)Secure digest: default passwords, sensitive info for free, and phisher salary
Every month we collect "classic" and non-trivial incidents on Infosecurity across the world and in Russia in particular. Here is our first digest for 2021.
12.02
Blog
#Employee monitoring
#Fraud
#Risk management
COBM: once a leak always a leak
One of the most massive compilation leaks
10.02
Blog
#Risk assessment
#Database
#Risk management
iPhones which weren't meant for selling
An employee of a recycling company profiteered from selling Apple products
04.02
Blog
#Employee monitoring
#Fraud
#Devices
ABSA leak might still have impact
How is ABSA bank doing after an employee’s security policy violation?
28.01
Blog
#Fraud
#Employee monitoring
#Third party
Insider check: could you be damage to your company?
The test will define you as a certain type of insider. Remember: any employee could become a culprit of a leak, however, circumstances are different. We don’t mean to pretend “scientific”, we intend to make this test entertaining and informative.
27.01
Blog
#Insider
#Internal threat
#Risk management
Legal monitoring, smartphones control and your employee personal portrait
These and other ticklish issues regarding the launch of information security solution within your system.
20.01
Blog
#DLP
#Employee monitoring
#Devices
Signal replaces WhatsApp?
The most popular messenger has recently announced an update which made users question its necessity
19.01
Blog
#Messengers, social media, apps
#Personal data
#Compliance
Ex-employee takes data to a new job
SoftBank former employee took data to another company, whereas a Canadian firm Aurora Cannabis informed its staffers about breached personal data on the last day of the year.
15.01
Blog
#Former employees
#Personal data
#Confidential documents
Why does healthcare require the severest cybersecurity measures?
Innovations are designed to improve the quality of service and save time for patients and doctors, however, doctors and patients realize how vulnerable medical information is.
25.12
Blog
2020 infosec in pictures
You've been with us all this year and you remember all 2020 news we've shared with you. Let's smile and frown at it together!
23.12
Blog
#Fraud
#Personal data
#Risk management
Ledger hardware wallet breach echoes with phishing
The investigation into the Ledger compromised security case was launched after the data breach which dates back to June 25, 2020.
22.12
Blog
#Personal data
#Investigation
#Confidential documents
An entire database stolen, Microsoft hacked
People’s Energy company faces an overwhelming data exposure, Microsoft becomes another company tricked by hackers via SolarWinds in case the investigation proves it.
18.12
Blog
#Database
#Investigation
#Risk management
FAQ: Frequently Asked and Finally Answered
15 questions the monitoring solution developer responds to during seminars.
16.12
Blog
#Employee monitoring
#Productivity
#Cloud
Agencies urged to disconnect SolarWinds Orion
...as the massive exploit has been recently reported.
14.12
Blog
#Risk assessment
#Third party
#Investigation
Should companies pay ransom? Is there a way out when you’re deprived of confidential data?
One of the world’s biggest plane makers got its data leaked.
07.12
Blog
#Former employees
#Personal data
#Confidential documents
How much can a GDPR breach cost you?
Non-compliance could cost companies dearly
03.12
Blog
#Compliance
#Risk management
#Personal data
Records of 16 million Brazilian Covid-19 patients leaked
The spreadsheet was found on GitHub
30.11
Blog
#Personal data
#Human factor
#Internal threat
South Koreans data was leaked by Facebook
Facebook is penalized by South Korea’s regulatory authority for divulging user data.
26.11
Blog
#Messengers, social media, apps
#Third party
#Personal data