Blog

How to stop hackers

06.07.2020

Hacking isn’t quite as flashy as in the movies and it takes a major time investment on the criminal’s part, however it is every bit as damaging and threatening to companies as it is portrayed


Insider Employee monitoring Risk management

Corporate espionage

02.07.2020

A little-known evil that is occurring today is the phenomenon of industrial espionage. In fact, this is a problem that has been around for quite some time.


Fraud Internal threat Insider

Internet privacy laws and regulations

30.06.2020

One of the greatest challenges in the world today is making the Internet a secure place.


Compliance Database Risk management

The cloud services revolution

29.06.2020

Conducting software and web operations is an expensive endeavor indeed.


Cloud Database Encryption

The information security team

26.06.2020

Cyber criminals are working very hard to discover top-secret company information in order to sabotage it or sell the information to other companies.


Risk management Risk assessment Internal threat

Security in an ever more connected world

25.06.2020

We live in a world that is forever shrinking, and the more connected we become to the things in our environment, the more convenient our errands and everyday work become.


Devices Cloud Risk assessment

How to detect suspicious activity in databases till information gets exported

23.06.2020

As SearchInform releases Database Monitor we want to detail the way to use the DAM solution so that violating access rights and making changes to sensitive documents become transparent for those responsible for risk mitigation and data protection.


Database Confidential documents Personal data

The CIA and its major security incident

18.06.2020

This year the processing of the court case considering the employee who breached the CIA's data in 2016 to WikiLeaks has been resumed


Employee monitoring Risk assessment Confidential documents

Monitoring solution in the cloud

11.06.2020

According to the research conducted by SearchInform, each company detected a user attempt to take at least some corporate data, whereas only 26% controlled employee activity with the help of monitoring software.


Cloud Employee monitoring Risk management

Database access audit

09.06.2020

The solution for protection of information stored in databases monitors data export and user requests and alerts to any change


Database Employee monitoring Confidential documents

To be applied... New apps, new laws

04.06.2020

Will the privacy limits be reconsidered? Dedigitisation as utopia


Personal data Messengers, social media, apps Devices

How to measure the performance of remote and onsite employees

02.06.2020

Going remote is a challenge, and work discipline might “shiver”. There is a chance that as soon as employees put on slippers and robes they will feel too comfortable and that will impact the quality of their performance.


Employee monitoring DLP Risk management

Reducing risks and staying alright

29.05.2020

Providing your employees with guidance


Remote employees Employee monitoring User behavior

How do crisis and stress affect your team?

28.05.2020

The need to transfer employees to remote work appeared to be one of the reasons to get stressed - businesses have to make such a transition to avoid losses and try to keep it going for as long as required.


Remote employees Employee monitoring Human factor

The ways companies risk security in a crisis: external threats

26.05.2020

Pandemic, oil collapse, global economic crisis, there are enough reasons for concern in 2020. However, these are not the only factors that will influence businesses all over the world.

The ways companies risk security in a crisis: internal threats

26.05.2020

According to the research by SearchInform, 100% of companies identified the attempts of employees to take corporate data during the first months of using the company’s services

The rise of virtual private networks

22.05.2020

Everyone is well aware that criminals on the internet are becoming savvier every day.


Risk management Remote employees Confidential documents

Have companies managed to shift to remote work?

21.05.2020

SearchInform has conducted a research on companies’ experience in shifting to remote work and keeping business processes going.


Remote employees Employee monitoring Risk management

Staying ahead of malware

21.05.2020

With all the benefits that the worldwide connectivity of the Internet offers, so too come the vulnerabilities.


Risk management Confidential documents Risk assessment

Social engineering prevention

20.05.2020

When cyber criminals target organizations, their target normally is people themselves, because they can be manipulated. 70 to 90 percent of data breaches occur as a result of social engineering.


Email Risk assessment Human factor

Server performance monitoring

19.05.2020

In order for a website to operate, a database to be accessed from a distance, or e-mails to be facilitated, there must be a server to power this process.


Employee monitoring Risk management Internal audit

Common unethical business practices

18.05.2020

We live in a world full of risks and individuals who are willing to do others harm when an opportunity for personal gain presents itself.


Employee monitoring Fraud Insider

As businesses keep staying remote. Use cases

18.05.2020

Which instruments can be installed and how do they help?


Risk management Employee monitoring Remote employees

Software security and efficiency

15.05.2020

With all of the programs the ordinary user has installed on his computer, users are frequently proposed to have a software update performed.


Remote employees DLP Employee monitoring

As businesses keep staying remote

15.05.2020

The insight into key threats and brief reminder why you shouldn't set it loose.


Remote employees Employee monitoring Risk management

Setting up access to company files

14.05.2020

Due to potential social engineering and the fact that many losses that companies suffer are related to employees, access control system installation is a major factor in ensuring company security.

Remote work: the way of the future?

29.04.2020

Nobody would deny that the world is going digital. Like it or not, things are becoming ever more automated as technology facilitates business processes to an ever larger degree.


Remote employees Employee monitoring Productivity

Access control

29.04.2020

We all know very well that companies have their secrets as to the way they operate and that companies are always interested in the state of their security and potential losses


Database DLP Internal audit

Compliance issues in the workplace

29.04.2020

One of the ways that companies are gaining more success and reducing crime is through compliance issue management – compliance on all policy, in a broad spectrum of areas.


Compliance Risk assessment Risk management

Personal data protection

29.04.2020

Despite the greater amount of opportunities and convenience that the Internet provides us, we also find ourselves vulnerable in the event that we fall victim to an Internet scams.

Risk management

29.04.2020

No matter what you do in life, there are always risks. And this is a good thing, because without risk, there is no potential reward.


Risk management Risk assessment DLP

Social engineering attacks

28.04.2020

With how connected the Internet is today, a lot of information that we couldn’t afford to share is potentially within the grasp of the most inventive malicious predators online.


Investigation Personal data Risk management

Risk management in healthcare

28.04.2020

Our health information is a private issue. For a number of reasons, people’s health information being shared could result in negative consequences.


Employee monitoring Risk management Confidential documents

Project management tools

28.04.2020

Project management software also provides us a range of benefits, from scheduling events to creating project plans, and there are certain methods and tools that, if taken into account, provide a multitude of benefits and evade numerous risks that make it worth obtaining


Employee monitoring Productivity User behavior

Employee time tracking

27.04.2020

On both fronts, time tracking software stands to render the lives of employees and employers much easier.


Employee monitoring DLP Productivity

Employee monitoring software: is it illegal?

24.04.2020

The first question one might ponder is: “Is it illegal to monitor employees’ computers?” The issue of employee monitoring has become a bit of a contested topic in recent years.


Employee monitoring Remote employees DLP

Have you got everything fixed?

17.04.2020

Look at our brief reminder and maintain vigilance


Cloud DLP Employee monitoring

Indispensable services during lockdown

10.04.2020

Solutions we use for remote working and industries we need for isolated living


Remote employees Cloud Devices

Remote work creates tendencies

09.04.2020

Is your business among them?


Remote employees Cloud Productivity

Morrisons' implication has been ruled out

02.04.2020

And the company might “set precedent”, according to The Telegraph


Employee monitoring Fraud Insider

Is there a safe way of using apps?

02.03.2020

And what is more dangerous: spyware or mere negligence when using digital services?


Messengers, social media, apps Human factor User behavior

Five sectors that benefit most from employee monitoring software

19.02.2020

Improvements in technology have radically changed the way we work


Employee monitoring Human factor Risk management

2019: trends and breaches

27.12.2019

This autumn, experts have counted 5183 data breaches around the world compromising 7.9 billion records, and 2019 was claimed to be the worst in the history of data leakage.


Employee monitoring Former employees Personal data

How to max out SearchInform services

12.12.2019

Do you consider launching comprehensive monitoring of your internal business processes and even reinvent business continuity management strategy but aren’t sure you want to delve into risk management program and hire extra staff, assign your specialists to the new job and purchase the system to integrate it with your business architecture and implement all the control? If you do – read and learn how to establish a smoothly supervized workflow and not to the detriment of your primary activities.


Risk management Employee monitoring Investigation

Deepfake: when audio forged by social engineering becomes a global threat

09.12.2019

According to Gartner, by 2022 30% of all the cyberattacks could be targeted at damaging data, which is the material for neural network algorithm manipulations, as well as at the theft of ready-made machine learning examples.


Machine learning Fraud Investigation

Wanted: who is the most dangerous employee in a bank?

06.12.2019

They all work with different information, dealing with data at rest and data in use, have their own tasks and use specific instruments.


Employee monitoring User behavior Personal data

Voice assistants risk assessment

22.11.2019

Voice assistants became subject to investigative journalism — a few high profile publications made readers think twice before using a “helper” or even talking close to the microphone. And that is what we have learned this year.


Devices Third party Personal data

Data at rest encryption

21.11.2019

Whether your data encryption is on your computer, a flash drive, on a cloud, or includes your entire disc, proper encryption and management are essential to keep your resources and data safe and ensure that you maintain compliance.


Encryption Database Risk management

What is a DLP system? How do active DLP systems work in 2019?

07.11.2019

Although everyone is aware of risks that their data could be stolen, this is only the beginning of the IT risks companies must safeguard themselves from.


DLP Personal data Cloud

Data protection

06.11.2019

Business processes are migrating into a virtual environment, and companies have long started to keep e-document flow while introducing new management technologies.


Confidential documents Messengers, social media, apps Risk management

Data forensics

17.10.2019

When most people hear the word “forensics”, what usually comes to peoples’ minds right away is that it will involve somebody in a lab and a white coat working long hours.


User behavior Fraud Employee monitoring

Protecting information on flash drives | how to protect files on flash drives

15.10.2019

A joint study of Illinois and Michigan universities revealed that 48% of people plug in random flash drives. We have selected the main points and findings which prove that the user behaviour plays an important role in protecting information.


Devices Confidential documents Database

Risk management matrix

14.10.2019

We take risks every day, from the moment we wake up until we go to bed at night, as they are a normal part of life.


Risk management Risk assessment

What is an insider threat detection program?

10.10.2019

Although we all hope that we can trust each of our employees and that it will never happen to us, the truth is that malicious insiders are a relevant risk in today’s corporate world.


Internal threat Insider Risk management

What is data at rest?

06.10.2019

Under the conditions of today’s digital climate, sooner or later your information will eventually find its way into the wrong hands.


Database Employee monitoring Confidential documents

Main aspects of information security

02.10.2019

Corporate security is not a new phenomenon. What we now understand as corporate security has existed since the emergence of trade. Merchants sought to protect their professional secrets from competitors in order not to lose profits.


Risk assessment Confidential documents Internal threat

Security risk management assessments

20.09.2019

Security risk assessments are performed for the purpose of identifying, evaluating, and prioritizing risks associated with a company’s use and operation of information systems to its operations and assets.


Risk management Risk assessment Internal threat

Employee monitoring issues

18.09.2019

Business ethics are the contemporary norms, set of values, and principles guiding the actions and behavior of employees at the companies they work for from a legal and moral standpoint.


Employee monitoring Productivity

Employment of friends and relatives

10.09.2019

The Sales Department had not been fulfilling a plan for three months. The reasons were unobvious: it was a business season, and there were no issues with the discipline and skills of the employees, but the number of deals has decreased.


Employee monitoring Risk assessment Internal threat

Detection and mitigation of internal corporate risks

07.09.2019

The meaning of risk is the possibility of loss. Thus, what risk management entails is the process of identifying, analyzing, assessing, and prioritizing risk.


Internal threat Risk management Confidential documents

Risk assessment matrices

05.09.2019

With the plethora of risks that accompany running a business, it is much more practical to have everything organized in written form or, better yet, in the form of diagrams for a concrete, concise representation of which risks the company faces as well as the severity of them.


Risk assessment Fraud Internal threat

Email monitoring

04.09.2019

As much as companies try to foster a culture of positivity in the corporate environment, put all sorts of system limitations in place, and emphasize strict company policy to keep employees from engaging in things they shouldn’t be doing, fraud still goes on, and it is rampant, hence the demand for email monitoring.


Email Human factor Fraud

Configuring DLP system

02.09.2019

The installation of a DLP system can be managed even by a novice system administrator. However, its fine-tuning requires some skills and experience.


DLP Risk assessment Investigation

Web activity monitoring

27.08.2019

In the technology era in which employers are looking to squeeze everything out of their employees that they can and optimize business efficiency to the max, a plethora of process optimization industries have sprouted up that offer to facilitate businesses’ success.


Employee monitoring Productivity

Remote employee monitoring

24.08.2019

As of late, there has been a great rise in employers’ desire to keep as close an eye on their employees as possible and analyze their activities in-depth to achieve the best idea of the level of their performance and the degree to which they are complying with policy.


Remote employees Employee monitoring Productivity

User behavior analytics

22.08.2019

Given the widely known and harnessed power of data analytics, companies utilize all sorts of information on their customers for a variety of purposes. Many use this information to most efficiently allocate their marketing expenses.


User behavior Employee monitoring Internal threat

Fundamentals of IS | Fundamentals of IS. data protection

17.08.2019

The founder of cybernetics Norbert Wiener believed that information has the unique characteristics and cannot be described as neither energy nor matter. A special status of information as a phenomenon resulted in a proliferation of definitions.


Compliance Risk management Internal threat

User activity monitoring

16.08.2019

The more that a company knows about its workers, the more it can harness that knowledge to propel the business’ success to the next level. Employers do not want to leave productivity up to chance.


Employee monitoring Productivity Risk management

Internal auditing

14.08.2019

It goes without saying that efficiency is one of the most basic ingredients of a successful business and there is always room to ameliorate.


Internal audit Risk assessment Risk management

Insider threat statistics

10.08.2019

A company having its secrets and confidential information stolen, its funds robbed, or damage caused to it is an ever-present threat that companies may take appropriate measures to avoid.


Insider Internal threat Employee monitoring

HR investigations

04.08.2019

Although the primary function of a human resources department is to recruit and train personnel, there are many situations in the workplace that HR has to deal with, including ethics breaches and company policy violations.


Investigation Employee monitoring Human factor

IS Worldwide | The problems of information security in the world

01.08.2019

By information security, we mean a set of organizational and technical measures to ensure the protection, integrity, accessibility and manageability of data arrays.


Confidential documents Risk management Internal threat

Extremist activity in the team

26.07.2019

The department head noticed that an employee’s work had changed for the worse.


Human factor Employee monitoring

Shell companies and drug network

26.07.2019

Company N called for a tender for preparation of design estimate documentation. At the stage of receiving requests the company found out that one of their employees had attempted to participate too.


Fraud Human factor Employee monitoring

Employee productivity

23.07.2019

Every bit of what makes a company successful comes from work implemented through the actions of a company’s employees.


Productivity Employee monitoring Human factor

How to digitize human factor

20.07.2019

Prevention is the key process of incident management – it is better to discover reasons and sources of a possible security breach than to fight consequences. Potential insiders are not easy to detect, and general data safety approach including basic instruments are not sufficient to reveal a violator.


Human factor User behavior Internal threat

Computer forensics

18.07.2019

When you discover that your enterprise has been victimized by cybercrime or breached, your first thought is to seek out the origin of the crime.


Investigation Human factor

Business continuity

16.07.2019

Considering the significant amount of money most people have invested in their businesses, it is important that the full rewards of it can be reaped.


Risk management Risk assessment Internal threat

Search for a new job

12.07.2019

An employee was viewing vacancies on his corporate computer and receiving invitations to job interviews sent by business competitors. A company's risk manager detected the suspicious activity and took the employee under control.


Employee monitoring Productivity Insider

Insider threat tools

09.07.2019

While all the hype about unknown threats breaching a company’s privacy, stealing its confidential information and company secrets, purposefully inflicting damage to its public image, and robbing it of its funds is worth keeping in mind to protect against, the losses that would result from that actually occurring are not as great as most people believe.


Insider Employee monitoring Fraud

Distribution of negative opinion

04.07.2019

The system detected the correspondence between colleagues discovering one of the employees being outraged by the incentive system and other aspects of the management approach to employees.


Messengers, social media, apps Employee monitoring Risk assessment

Data security and data encryption in business

02.07.2019

Encryption involves a plain text being coded into “encrypted” form using a cipher text and then being “decrypted” with a cipher text by the recipient on the other end.


Encryption Cloud

Corporate fraud investigations. Fraud security & protection

28.06.2019

Corporate fraud could be defined as a loss to a corporation due to deceitful management. These schemes are often marked by their complexity and economic impact.


Third party Fraud Investigation

What is Risk Mitigation Strategy? Define Risk Evaluation Plan

24.06.2019

To define risk mitigation, let us first specify what risk is. “Risk” is the possibility of loss. Thus, risk mitigation entails a concentrated effort to reduce adverse effects.


Risk management Risk assessment Investigation

What is Risk Management? Solutions, Strategies, Services & Tools

16.06.2019

Anyone who has ever been involved in business knows that there is risk everywhere. What is risk management?


Risk management Confidential documents Risk assessment

How to Reduce Internal and External Threats to Organizations

12.06.2019

With the current state of the global economy and employees feeling ever more pressure, internal security threats are on the rise.


Internal threat Confidential documents Human factor

Illegal business arrangements

11.06.2019

Employees can create their own legal entities that will interact with an employer company. For example, fraudsters can use their job positions and promote their own enterprise as a counterparty and at the same time offer disadvantageous terms and conditions of cooperation.


Insider Email Database

What is Fraud Detection? Fraud Detection Software & Solutions

07.06.2019

From advancing computing speeds to high-performance analytics to machine learning and other forms of AI, fraud prevention technology has come a long way.


Fraud Insider Human factor

Using personal mailbox

28.05.2019

Sending confidential details from corporate to personal email

What is Employee Monitoring Software or Employee Tracking System?

20.05.2019

Do you know what your employees are up to? Businesses are well aware that gaining a good understanding of what their employees are up to can work wonders in raising their work efficiency.


Employee monitoring Productivity User behavior

Information Security Threats

17.05.2019

Information security in the broadest sense is a combination of means to protect information from accidental or deliberate exposure.


Internal threat Risk assessment Cloud

Information Security Incident Management | IS Incident Management

10.05.2019

The system of data leakage protection is based, above all, on the detection, prevention, registration and mitigation of information security incidents or events that violate regulated procedures.


Risk management Compliance Investigation

Protection Against Information Leaks | Organization the protection of information from leakage through technical channels

01.05.2019

We reviewed the results of the study related to the leakage of financial and other corporate confidential information.


DLP Confidential documents Devices

How to Choose a DLP System

27.04.2019

The global market of information security tools offers a wide range of DLP systems (Data Leak Prevention). And the demand for them is only growing.


DLP Investigation

Identifying terror threats

23.04.2019

The correspondence of employees in the corporate chat was intercepted. The employees were discussing the war in Syria, and one of them spoke negatively of Russia’s role in the conflict.


Human factor Employee monitoring Risk assessment

Methods to Protect Information | Methods and Tools for Data Protection

18.04.2019

Computer data is prone both to loss due to malfunction or destruction of equipment, and to theft. Protection methods include the use of hardware and devices, as well as specialized technical tools with software.


Risk management Third party Risk assessment

DLP systems | What is a DLP system, and how does it work?

14.04.2019

As of today, the market of DLP systems is one of the fastest growing among all markets of information security tools.


DLP Employee monitoring

Concept of DLP Systems | What is a DLP system?

09.04.2019

DLP software is used to protect confidential data from internal threats. However, even if information security specialists adopted protection tools and use them against external violators, struggle with internal violators is more challenging.


DLP

Using personal mailbox

05.04.2019

A car center employee was caught sending sensitive data from corporate to personal email.


Email Confidential documents Risk management

Personal data leakage

01.04.2019

The risk management department noticed that one of the dentists of the state clinic used to send to his personal email cards with health data.


Database Email Employee monitoring

Communication with competitors

25.03.2019

An employee received a message with an offer to meet and discuss “some common issues”.


Messengers, social media, apps Insider Employee monitoring

Leakage of a customer database

22.03.2019

A security policy response attracted the attention of the risk managers responsible for monitoring to the abnormal activity of an employee who accessed the customer databases that include the information on individuals.


Database Confidential documents

Attempt to leak tender documentation

20.03.2019

The results of the monitoring revealed that the employee was ordered to send the document to this email address by his manager.


Email Confidential documents Investigation

Leakage of a supplier database

18.03.2019

The study of user relations made it possible to establish that the employee transmitted information to her husband who had a plot with the company's competitors.


Cloud Database Confidential documents

Payoffs

17.03.2019

An employee logged into the personal mailbox from the corporate computer – a DLP system automatically "scanned" the last sent and received emails.


DLP Email

Leakage of a company's business plan

15.03.2019

With the help of the integrated policies the system alerted to a suspicious activity - one of the employees discussed the company's short-term development plans with an unknown user via Skype.


Former employees Messengers, social media, apps Confidential documents

Leaking the company's know-how

12.03.2019

The risk management department found confidential files on the computer of an employee who wasn't authorized to access them. Moreover, when the incident happened, the employee was on vacation.


Confidential documents DLP

Fraud Detection & Prevention Software: Business, Accounting, Banks

09.03.2019

If most people were asked if stealing is wrong, they would answer “Yes”. In spite of this, organizations all over the world lose about 4 billion dollars to fraud on an annual basis.


Fraud Risk assessment Risk management

How to Prevent Identity Theft & Fraud. Types of Corporate Frauds.

07.03.2019

Avoiding corporate fraud is no easy task considering the great variety of forms of embezzlement and deception that may take place. In the past 20 years, over 1,000 executives have been convicted of corporate fraud.


Fraud Employee monitoring Investigation

Attempt to leak the local network topology

02.03.2019

The risk management department spotted one of the lawyers copying the document with the schemes of local networks and communication of the company to the personal flash drive.


Encryption Employee monitoring DLP

Integration of DLP Systems | Integration of DLP Systems in the company

14.11.2018

DLP (Data Leak Prevention) is a comprehensive software product to prevent theft, modification and dissemination of confidential information. DLP-system monitor all the traffic within a protected corporate network.


DLP Risk assessment Internal threat