Critical infrastructure: current situation and best cybersecurity practices
The ultimate guide to securing your industrial network using the best network security practices
What is cybercrime and examples of a few biggest cybercrimes
An overview of cyber threats, endangering companies and organizations worldwide in 2022.
What is The European Data Protection Day and why data privacy is so important
An overview of some biggest cases of corporate frauds in history.
What is an efficient endpoint protection and a slight overvierw of best solutions.
(In)secure digest: the smell of data leaks, deep fake in the Zoom and an option of becoming the nobility member for only €1000
In August many employees are still on a vacation, however, this doesn’t refer to fraudsters, judicial and law enforcement system representatives. In our traditional digest among other you’ll find – one more shot in the foot and another example of peoples’ craving for a fairy tale.
What is an insider threat and who is an insider? What types of insider threats exist? How to detect an insider threat and what is required to do in order to mitigate risks? You may refere to the article and find out.
The time has come to discuss if July was full with cyber incidents. As usual, we’ve gathered the most impressive cases, reported by mass media. Here we have unreliable suppliers, long-suffering Marriott, experiencing new data leaks and not very responsible personal data operator, which seems not to care about clients at all.
The time has come to reveal some “classic” and non-trivial information security incidents. As usual, we’ve gathered some of the most impressive cases of the month in our digest.
In this article we continue to deal with the topic of corporate security, and we’ll provide a slight overview of some information security trends and advice on how top-managers may eliminate the ongoing risks.
It seems that the time has come to elaborate new approach to the concept of organization security
The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled
Revenge hacks and what prevention measures to take
How to make security part of a general risk prevention and mitigation program
Pfizer discovers an insider working for a competitor, whereas Genentech hit the news with a deep-rooted story months ago.
David Balaban reflects on the DLP vendors' race for attention, adding of new features, sometimes going beyond the boundaries.
More and more people are unwilling to share their personal data with third parties
The company decided to exempt a number of employees from groups which have access to internal message boards.
Don't become a phisher’s target, it's avoidable.
Ripple events are nearly untraceable and affect hundreds of companies
The relevant statistics and most common security issues in 2021 so far
Who should you trust in a digital world?
How efficient are DLP systems with preset configurations? Can a system be configured once and for good? Learn how to adjust the settings here.
Top 5 actions to be taken by CEO to increase cybersecurity and employee trust in the company
Almost a million Trello boards, thousands of which contain corporate data of large and small Russian companies, were publicly available.
How to choose a system and not to get disappointed
SearchInform customer – scientific technological pharmaceutical company Polysan – has deployed FileAuditor, a DCAP system, and shared the first impression with the company.
A piece of insight into infosec as an MSSP solution
Expansion of the IT infrastructure complicates controlling who accesses, copies, moves from folders, and deletes information. In case company's confidential files and folders are not organized, it's almost impossible to keep that data secure. The task is solved with specialized DCAP systems.
The most comical infosecurity incidents to laugh and learn from it. Enjoy, but tread carefully!
Interview with Sergey Ozhegov, CEO of SearchInform
Is the system really hidden on an endpoint? All about invisible DLP control and where its cloak of invisibility loses powers
The DLP doesn’t function in a hidden mode for nothing: on the one hand, it doesn’t interfere with the work of respectable employees, on the other hand, it helps to catch insiders off guard.
The “Roaring 20s” is no longer a euphemism from the last century, in the 21st the new decade also began loudly.
Proven schemes for searching for corrupt individuals in the company.
Security Information and Event Management works on the principle of video surveillance. Cameras stand for connectors that collect data from hardware and software, whereas the object of the surveillance is an IT infrastructure featuring PCs, network devices, and servers. When configured properly, SIEM simplifies the monitoring of information security. How to organize the work, what to control first, and how to respond to incidents? - we will answer these questions using the example of SearchInfo
Every month we collect "classic" and non-trivial incidents on Infosecurity across the world and in Russia in particular. Here is our first digest for 2021.
The test will define you as a certain type of insider. Remember: any employee could become a culprit of a leak, however, circumstances are different. We don’t mean to pretend “scientific”, we intend to make this test entertaining and informative.
These and other ticklish issues regarding the launch of information security solution within your system.
Innovations are designed to improve the quality of service and save time for patients and doctors, however, doctors and patients realize how vulnerable medical information is.
You've been with us all this year and you remember all 2020 news we've shared with you. Let's smile and frown at it together!
15 questions the monitoring solution developer responds to during seminars.
Every month we enrich our collection of classic and non-trivial cybersecurity cases. Data leaks, frauds, sabotage, and other incidents caused by insiders are of our interest.
83% of companies chose cloud to deal with cybersecurity issues of remote work quick
Keeping the accounts of dismissed employees active and failing to revoke excessive rights might be one of the biggest mistakes a company can make.
We collected "classic" and non-trivial incidents reported by foreign media
Today DLP system’s purpose is not just monitoring data leaks as it was in the beginning - now DLP systems are commonly used to solve a much broader list of problems.
How can you analyse employee personality and steer clear of breaching privacy?
SearchInform analysed breaches that occurred in the first half of 2020.
SearchInform Database Monitor is a database activity monitoring software, which purpose is to mitigate an insider breach.
Security innovations and strict compliance are key in achieving the utmost security for your cloud data.
...or 7 stories about stupidity, careless work, credulity and their consequences
There is an edifying example, which proves common knowledge that there is many a slip ‘twixt cup and lip.
Insider threat is a tough and quirky menace to track down and pin.
Proper information governance facilitates data search and analysis required for internal investigation.
In order to transform disorganized data into valuable insights you certainly need a powerful tool, which will assist you in file analysis ensuring frequent information verification.
As different departments have their own specific risk management frameworks they lack correlation and coordination - enterprise risk management ensures consistency.
A detailed check-list of actions to take in order to save the data
Two important data protection questions to answer: Why and How to protect data at rest, in motion and in use
A short explanation why to protect your sensitive data, types of data and advice on how to protect data at rest, in motion and in use.
Are you sure that your employees do not goof off? Are you sure your employees are not idling away precious hours of productivity they rather spend on work-related tasks?
There are so many contextual factors to sift through that actually finding the newest threat and eliminating it is an encumbering job.
Regulatory internet data laws you should be aware of and maintain compliance with
The solution boosts risk assessment ensuring that access rights are properly managed and privileged user activity is under control, data access policies are in place and kept updated.
The massive impact of access to your data being obtained and an outsider security risk materializing cannot be overstated.
Our data need insurance, and just like we have to cover every other potential risk that we couldn’t afford compensating for if it materialized, we need to conduct a security audit of our sensitive data.
Sometimes people do the simplest cyber security mistakes, namely, misconfiguring a database or using the same password for their bank account that they used for their social media
The very courthouse that they broke into last night and now they’re sitting in the courthouse waiting to see the judge.
Conducting a penetration test on a courthouse and defending in front of a judge in the same building a few hours after – this is what happened to two pentesters working under contract.
The financial service company sector is targeted more than any other industry, as attacks against them account for over a quarter of cyberattacks.
Businesses realized the important role devices play as long ago as 2004, thus giving rise to mobile device management, a set of tools and practices that allow administrators to manage devices, apps, and increase device security.
Hacking isn’t quite as flashy as in the movies and it takes a major time investment on the criminal’s part, however it is every bit as damaging and threatening to companies as it is portrayed
A little-known evil that is occurring today is the phenomenon of industrial espionage. In fact, this is a problem that has been around for quite some time.
One of the greatest challenges in the world today is making the Internet a secure place.
Conducting software and web operations is an expensive endeavor indeed.
Cyber criminals are working very hard to discover top-secret company information in order to sabotage it or sell the information to other companies.
We live in a world that is forever shrinking, and the more connected we become to the things in our environment, the more convenient our errands and everyday work become.
As SearchInform releases Database Monitor we want to detail the way to use the DAM solution so that violating access rights and making changes to sensitive documents become transparent for those responsible for risk mitigation and data protection.
This year the processing of the court case considering the employee who breached the CIA's data in 2016 to WikiLeaks has been resumed
According to the research conducted by SearchInform, each company detected a user attempt to take at least some corporate data, whereas only 26% controlled employee activity with the help of monitoring software.
The solution for protection of information stored in databases monitors data export and user requests and alerts to any change
Will the privacy limits be reconsidered? Dedigitisation as utopia
Going remote is a challenge, and work discipline might “shiver”. There is a chance that as soon as employees put on slippers and robes they will feel too comfortable and that will impact the quality of their performance.
The need to transfer employees to remote work appeared to be one of the reasons to get stressed - businesses have to make such a transition to avoid losses and try to keep it going for as long as required.
Pandemic, oil collapse, global economic crisis, there are enough reasons for concern in 2020. However, these are not the only factors that will influence businesses all over the world.
According to the research by SearchInform, 100% of companies identified the attempts of employees to take corporate data during the first months of using the company’s services
Everyone is well aware that criminals on the internet are becoming savvier every day.
SearchInform has conducted a research on companies’ experience in shifting to remote work and keeping business processes going.
With all the benefits that the worldwide connectivity of the Internet offers, so too come the vulnerabilities.
When cyber criminals target organizations, their target normally is people themselves, because they can be manipulated. 70 to 90 percent of data breaches occur as a result of social engineering.
In order for a website to operate, a database to be accessed from a distance, or e-mails to be facilitated, there must be a server to power this process.
We live in a world full of risks and individuals who are willing to do others harm when an opportunity for personal gain presents itself.
Which instruments can be installed and how do they help?
With all of the programs the ordinary user has installed on his computer, users are frequently proposed to have a software update performed.
The insight into key threats and brief reminder why you shouldn't set it loose.
Due to potential social engineering and the fact that many losses that companies suffer are related to employees, access control system installation is a major factor in ensuring company security.
Nobody would deny that the world is going digital. Like it or not, things are becoming ever more automated as technology facilitates business processes to an ever larger degree.
We all know very well that companies have their secrets as to the way they operate and that companies are always interested in the state of their security and potential losses
One of the ways that companies are gaining more success and reducing crime is through compliance issue management – compliance on all policy, in a broad spectrum of areas.
Despite the greater amount of opportunities and convenience that the Internet provides us, we also find ourselves vulnerable in the event that we fall victim to an Internet scams.
No matter what you do in life, there are always risks. And this is a good thing, because without risk, there is no potential reward.
With how connected the Internet is today, a lot of information that we couldn’t afford to share is potentially within the grasp of the most inventive malicious predators online.
Our health information is a private issue. For a number of reasons, people’s health information being shared could result in negative consequences.
Project management software also provides us a range of benefits, from scheduling events to creating project plans, and there are certain methods and tools that, if taken into account, provide a multitude of benefits and evade numerous risks that make it worth obtaining
On both fronts, time tracking software stands to render the lives of employees and employers much easier.
The first question one might ponder is: “Is it illegal to monitor employees’ computers?” The issue of employee monitoring has become a bit of a contested topic in recent years.
Solutions we use for remote working and industries we need for isolated living
And the company might “set precedent”, according to The Telegraph
And what is more dangerous: spyware or mere negligence when using digital services?
Improvements in technology have radically changed the way we work
This autumn, experts have counted 5183 data breaches around the world compromising 7.9 billion records, and 2019 was claimed to be the worst in the history of data leakage.
Do you consider launching comprehensive monitoring of your internal business processes and even reinvent business continuity management strategy but aren’t sure you want to delve into risk management program and hire extra staff, assign your specialists to the new job and purchase the system to integrate it with your business architecture and implement all the control? If you do – read and learn how to establish a smoothly supervized workflow and not to the detriment of your primary activities.
According to Gartner, by 2022 30% of all the cyberattacks could be targeted at damaging data, which is the material for neural network algorithm manipulations, as well as at the theft of ready-made machine learning examples.
They all work with different information, dealing with data at rest and data in use, have their own tasks and use specific instruments.
Voice assistants became subject to investigative journalism — a few high profile publications made readers think twice before using a “helper” or even talking close to the microphone. And that is what we have learned this year.
Whether your data encryption is on your computer, a flash drive, on a cloud, or includes your entire disc, proper encryption and management are essential to keep your resources and data safe and ensure that you maintain compliance.
Although everyone is aware of risks that their data could be stolen, this is only the beginning of the IT risks companies must safeguard themselves from.
Business processes are migrating into a virtual environment, and companies have long started to keep e-document flow while introducing new management technologies.
When most people hear the word “forensics”, what usually comes to peoples’ minds right away is that it will involve somebody in a lab and a white coat working long hours.
A joint study of Illinois and Michigan universities revealed that 48% of people plug in random flash drives. We have selected the main points and findings which prove that the user behaviour plays an important role in protecting information.
We take risks every day, from the moment we wake up until we go to bed at night, as they are a normal part of life.
Although we all hope that we can trust each of our employees and that it will never happen to us, the truth is that malicious insiders are a relevant risk in today’s corporate world.
Under the conditions of today’s digital climate, sooner or later your information will eventually find its way into the wrong hands.
Corporate security is not a new phenomenon. What we now understand as corporate security has existed since the emergence of trade. Merchants sought to protect their professional secrets from competitors in order not to lose profits.
Security risk assessments are performed for the purpose of identifying, evaluating, and prioritizing risks associated with a company’s use and operation of information systems to its operations and assets.
Business ethics are the contemporary norms, set of values, and principles guiding the actions and behavior of employees at the companies they work for from a legal and moral standpoint.
The Sales Department had not been fulfilling a plan for three months. The reasons were unobvious: it was a business season, and there were no issues with the discipline and skills of the employees, but the number of deals has decreased.
The meaning of risk is the possibility of loss. Thus, what risk management entails is the process of identifying, analyzing, assessing, and prioritizing risk.
With the plethora of risks that accompany running a business, it is much more practical to have everything organized in written form or, better yet, in the form of diagrams for a concrete, concise representation of which risks the company faces as well as the severity of them.
As much as companies try to foster a culture of positivity in the corporate environment, put all sorts of system limitations in place, and emphasize strict company policy to keep employees from engaging in things they shouldn’t be doing, fraud still goes on, and it is rampant, hence the demand for email monitoring.
The installation of a DLP system can be managed even by a novice system administrator. However, its fine-tuning requires some skills and experience.
In the technology era in which employers are looking to squeeze everything out of their employees that they can and optimize business efficiency to the max, a plethora of process optimization industries have sprouted up that offer to facilitate businesses’ success.
As of late, there has been a great rise in employers’ desire to keep as close an eye on their employees as possible and analyze their activities in-depth to achieve the best idea of the level of their performance and the degree to which they are complying with policy.
Given the widely known and harnessed power of data analytics, companies utilize all sorts of information on their customers for a variety of purposes. Many use this information to most efficiently allocate their marketing expenses.
The founder of cybernetics Norbert Wiener believed that information has the unique characteristics and cannot be described as neither energy nor matter. A special status of information as a phenomenon resulted in a proliferation of definitions.
The more that a company knows about its workers, the more it can harness that knowledge to propel the business’ success to the next level. Employers do not want to leave productivity up to chance.
It goes without saying that efficiency is one of the most basic ingredients of a successful business and there is always room to ameliorate.
A company having its secrets and confidential information stolen, its funds robbed, or damage caused to it is an ever-present threat that companies may take appropriate measures to avoid.
Although the primary function of a human resources department is to recruit and train personnel, there are many situations in the workplace that HR has to deal with, including ethics breaches and company policy violations.
By information security, we mean a set of organizational and technical measures to ensure the protection, integrity, accessibility and manageability of data arrays.
The department head noticed that an employee’s work had changed for the worse.
Company N called for a tender for preparation of design estimate documentation. At the stage of receiving requests the company found out that one of their employees had attempted to participate too.
Every bit of what makes a company successful comes from work implemented through the actions of a company’s employees.
Prevention is the key process of incident management – it is better to discover reasons and sources of a possible security breach than to fight consequences. Potential insiders are not easy to detect, and general data safety approach including basic instruments are not sufficient to reveal a violator.
When you discover that your enterprise has been victimized by cybercrime or breached, your first thought is to seek out the origin of the crime.
Considering the significant amount of money most people have invested in their businesses, it is important that the full rewards of it can be reaped.
An employee was viewing vacancies on his corporate computer and receiving invitations to job interviews sent by business competitors. A company's risk manager detected the suspicious activity and took the employee under control.
While all the hype about unknown threats breaching a company’s privacy, stealing its confidential information and company secrets, purposefully inflicting damage to its public image, and robbing it of its funds is worth keeping in mind to protect against, the losses that would result from that actually occurring are not as great as most people believe.
The system detected the correspondence between colleagues discovering one of the employees being outraged by the incentive system and other aspects of the management approach to employees.
Encryption involves a plain text being coded into “encrypted” form using a cipher text and then being “decrypted” with a cipher text by the recipient on the other end.
Corporate fraud could be defined as a loss to a corporation due to deceitful management. These schemes are often marked by their complexity and economic impact.
To define risk mitigation, let us first specify what risk is. “Risk” is the possibility of loss. Thus, risk mitigation entails a concentrated effort to reduce adverse effects.
Anyone who has ever been involved in business knows that there is risk everywhere. What is risk management?
With the current state of the global economy and employees feeling ever more pressure, internal security threats are on the rise.
Employees can create their own legal entities that will interact with an employer company. For example, fraudsters can use their job positions and promote their own enterprise as a counterparty and at the same time offer disadvantageous terms and conditions of cooperation.
From advancing computing speeds to high-performance analytics to machine learning and other forms of AI, fraud prevention technology has come a long way.
Do you know what your employees are up to? Businesses are well aware that gaining a good understanding of what their employees are up to can work wonders in raising their work efficiency.
Information security in the broadest sense is a combination of means to protect information from accidental or deliberate exposure.
The system of data leakage protection is based, above all, on the detection, prevention, registration and mitigation of information security incidents or events that violate regulated procedures.
Protection Against Information Leaks | Organization the protection of information from leakage through technical channels
We reviewed the results of the study related to the leakage of financial and other corporate confidential information.
The global market of information security tools offers a wide range of DLP systems (Data Leak Prevention). And the demand for them is only growing.
The correspondence of employees in the corporate chat was intercepted. The employees were discussing the war in Syria, and one of them spoke negatively of Russia’s role in the conflict.
Computer data is prone both to loss due to malfunction or destruction of equipment, and to theft. Protection methods include the use of hardware and devices, as well as specialized technical tools with software.
As of today, the market of DLP systems is one of the fastest growing among all markets of information security tools.
DLP software is used to protect confidential data from internal threats. However, even if information security specialists adopted protection tools and use them against external violators, struggle with internal violators is more challenging.
A car center employee was caught sending sensitive data from corporate to personal email.
The risk management department noticed that one of the dentists of the state clinic used to send to his personal email cards with health data.
An employee received a message with an offer to meet and discuss “some common issues”.
A security policy response attracted the attention of the risk managers responsible for monitoring to the abnormal activity of an employee who accessed the customer databases that include the information on individuals.
The results of the monitoring revealed that the employee was ordered to send the document to this email address by his manager.
The study of user relations made it possible to establish that the employee transmitted information to her husband who had a plot with the company's competitors.
An employee logged into the personal mailbox from the corporate computer – a DLP system automatically "scanned" the last sent and received emails.
With the help of the integrated policies the system alerted to a suspicious activity - one of the employees discussed the company's short-term development plans with an unknown user via Skype.
The risk management department found confidential files on the computer of an employee who wasn't authorized to access them. Moreover, when the incident happened, the employee was on vacation.
If most people were asked if stealing is wrong, they would answer “Yes”. In spite of this, organizations all over the world lose about 4 billion dollars to fraud on an annual basis.
Avoiding corporate fraud is no easy task considering the great variety of forms of embezzlement and deception that may take place. In the past 20 years, over 1,000 executives have been convicted of corporate fraud.
The risk management department spotted one of the lawyers copying the document with the schemes of local networks and communication of the company to the personal flash drive.
DLP (Data Leak Prevention) is a comprehensive software product to prevent theft, modification and dissemination of confidential information. DLP-system monitor all the traffic within a protected corporate network.