Blog
Why does healthcare require the severest cybersecurity measures?
25.12.2020
Innovations are designed to improve the quality of service and save time for patients and doctors, however, doctors and patients realize how vulnerable medical information is.
2020 infosec in pictures
23.12.2020
You've been with us all this year and you remember all 2020 news we've shared with you. Let's smile and frown at it together!
FAQ: Frequently Asked and Finally Answered
16.12.2020
15 questions the monitoring solution developer responds to during seminars.
(In)secure digest: Tesla sabotage, hospital blackmailer and excessively patriotic President
13.11.2020
Every month we enrich our collection of classic and non-trivial cybersecurity cases. Data leaks, frauds, sabotage, and other incidents caused by insiders are of our interest.
Indian companies chose cloud
12.11.2020
83% of companies chose cloud to deal with cybersecurity issues of remote work quick
How much can a former employee cost you?
09.11.2020
Keeping the accounts of dismissed employees active and failing to revoke excessive rights might be one of the biggest mistakes a company can make.
(In) Secure digest: the science of information security, death cyberattack, and bank leaks
27.10.2020
We collected "classic" and non-trivial incidents reported by foreign media
10 questions about the DLP system: why do I need it, what can I do, and what can't I do?
14.10.2020
Today DLP system’s purpose is not just monitoring data leaks as it was in the beginning - now DLP systems are commonly used to solve a much broader list of problems.
Rights and wrongs when creating profile
08.10.2020
How can you analyse employee personality and steer clear of breaching privacy?
Data breaches analysis
25.09.2020
SearchInform analysed breaches that occurred in the first half of 2020.
Database Monitor access control management
17.09.2020
SearchInform Database Monitor is a database activity monitoring software, which purpose is to mitigate an insider breach.
Data Protection in the Cloud
14.09.2020
Security innovations and strict compliance are key in achieving the utmost security for your cloud data.
The Darwin Awards in Information Security World
09.09.2020
...or 7 stories about stupidity, careless work, credulity and their consequences
What is confidential information and how does it affect your finances?
07.09.2020
There is an edifying example, which proves common knowledge that there is many a slip ‘twixt cup and lip.
Use case: user behavior and insider detection
04.09.2020
Insider threat is a tough and quirky menace to track down and pin.
Use case: eDiscovery
28.08.2020
Proper information governance facilitates data search and analysis required for internal investigation.
Use case: file cleanup
27.08.2020
In order to transform disorganized data into valuable insights you certainly need a powerful tool, which will assist you in file analysis ensuring frequent information verification.
Ensuring security and compliance in multi-departmental teams
26.08.2020
As different departments have their own specific risk management frameworks they lack correlation and coordination - enterprise risk management ensures consistency.
If a data breach - then data protection tips
21.08.2020
A detailed check-list of actions to take in order to save the data
Two important data protection questions to answer: Why and How to protect data at rest, in motion and in use
14.08.2020
A short explanation why to protect your sensitive data, types of data and advice on how to protect data at rest, in motion and in use.
Key features of employee monitoring software
07.08.2020
Are you sure that your employees do not goof off? Are you sure your employees are not idling away precious hours of productivity they rather spend on work-related tasks?
User activity audit, investigation
06.08.2020
There are so many contextual factors to sift through that actually finding the newest threat and eliminating it is an encumbering job.
Compliance
06.08.2020
Regulatory internet data laws you should be aware of and maintain compliance with
Use case: access control and change management
06.08.2020
The solution boosts risk assessment ensuring that access rights are properly managed and privileged user activity is under control, data access policies are in place and kept updated.
Data protection and classification
04.08.2020
The massive impact of access to your data being obtained and an outsider security risk materializing cannot be overstated.
Access rights audit
04.08.2020
Our data need insurance, and just like we have to cover every other potential risk that we couldn’t afford compensating for if it materialized, we need to conduct a security audit of our sensitive data.
Impactful data breaches in 2020 so far
31.07.2020
Sometimes people do the simplest cyber security mistakes, namely, misconfiguring a database or using the same password for their bank account that they used for their social media
Life changing risks pentesters take to help you boost security (cont.)
28.07.2020
The very courthouse that they broke into last night and now they’re sitting in the courthouse waiting to see the judge.
Life changing risks pentesters take to help you boost security
27.07.2020
Conducting a penetration test on a courthouse and defending in front of a judge in the same building a few hours after – this is what happened to two pentesters working under contract.
Businesses’ role in cyber security and threat prevention
20.07.2020
The financial service company sector is targeted more than any other industry, as attacks against them account for over a quarter of cyberattacks.
Mobile device encryption
08.07.2020
Businesses realized the important role devices play as long ago as 2004, thus giving rise to mobile device management, a set of tools and practices that allow administrators to manage devices, apps, and increase device security.
How to stop hackers
06.07.2020
Hacking isn’t quite as flashy as in the movies and it takes a major time investment on the criminal’s part, however it is every bit as damaging and threatening to companies as it is portrayed
Corporate espionage
02.07.2020
A little-known evil that is occurring today is the phenomenon of industrial espionage. In fact, this is a problem that has been around for quite some time.
Internet privacy laws and regulations
30.06.2020
One of the greatest challenges in the world today is making the Internet a secure place.
The cloud services revolution
29.06.2020
Conducting software and web operations is an expensive endeavor indeed.
The information security team
26.06.2020
Cyber criminals are working very hard to discover top-secret company information in order to sabotage it or sell the information to other companies.
Security in an ever more connected world
25.06.2020
We live in a world that is forever shrinking, and the more connected we become to the things in our environment, the more convenient our errands and everyday work become.
How to detect suspicious activity in databases till information gets exported
23.06.2020
As SearchInform releases Database Monitor we want to detail the way to use the DAM solution so that violating access rights and making changes to sensitive documents become transparent for those responsible for risk mitigation and data protection.
The CIA and its major security incident
18.06.2020
This year the processing of the court case considering the employee who breached the CIA's data in 2016 to WikiLeaks has been resumed
Monitoring solution in the cloud
11.06.2020
According to the research conducted by SearchInform, each company detected a user attempt to take at least some corporate data, whereas only 26% controlled employee activity with the help of monitoring software.
Database access audit
09.06.2020
The solution for protection of information stored in databases monitors data export and user requests and alerts to any change
To be applied... New apps, new laws
04.06.2020
Will the privacy limits be reconsidered? Dedigitisation as utopia
How to measure the performance of remote and onsite employees
02.06.2020
Going remote is a challenge, and work discipline might “shiver”. There is a chance that as soon as employees put on slippers and robes they will feel too comfortable and that will impact the quality of their performance.
How do crisis and stress affect your team?
28.05.2020
The need to transfer employees to remote work appeared to be one of the reasons to get stressed - businesses have to make such a transition to avoid losses and try to keep it going for as long as required.
The ways companies risk security in a crisis: external threats
26.05.2020
Pandemic, oil collapse, global economic crisis, there are enough reasons for concern in 2020. However, these are not the only factors that will influence businesses all over the world.
The ways companies risk security in a crisis: internal threats
26.05.2020
According to the research by SearchInform, 100% of companies identified the attempts of employees to take corporate data during the first months of using the company’s services
The rise of virtual private networks
22.05.2020
Everyone is well aware that criminals on the internet are becoming savvier every day.
Have companies managed to shift to remote work?
21.05.2020
SearchInform has conducted a research on companies’ experience in shifting to remote work and keeping business processes going.
Staying ahead of malware
21.05.2020
With all the benefits that the worldwide connectivity of the Internet offers, so too come the vulnerabilities.
Social engineering prevention
20.05.2020
When cyber criminals target organizations, their target normally is people themselves, because they can be manipulated. 70 to 90 percent of data breaches occur as a result of social engineering.
Server performance monitoring
19.05.2020
In order for a website to operate, a database to be accessed from a distance, or e-mails to be facilitated, there must be a server to power this process.
Common unethical business practices
18.05.2020
We live in a world full of risks and individuals who are willing to do others harm when an opportunity for personal gain presents itself.
As businesses keep staying remote. Use cases
18.05.2020
Which instruments can be installed and how do they help?
Software security and efficiency
15.05.2020
With all of the programs the ordinary user has installed on his computer, users are frequently proposed to have a software update performed.
As businesses keep staying remote
15.05.2020
The insight into key threats and brief reminder why you shouldn't set it loose.
Setting up access to company files
14.05.2020
Due to potential social engineering and the fact that many losses that companies suffer are related to employees, access control system installation is a major factor in ensuring company security.
Remote work: the way of the future?
29.04.2020
Nobody would deny that the world is going digital. Like it or not, things are becoming ever more automated as technology facilitates business processes to an ever larger degree.
Access control
29.04.2020
We all know very well that companies have their secrets as to the way they operate and that companies are always interested in the state of their security and potential losses
Compliance issues in the workplace
29.04.2020
One of the ways that companies are gaining more success and reducing crime is through compliance issue management – compliance on all policy, in a broad spectrum of areas.
Personal data protection
29.04.2020
Despite the greater amount of opportunities and convenience that the Internet provides us, we also find ourselves vulnerable in the event that we fall victim to an Internet scams.
Risk management
29.04.2020
No matter what you do in life, there are always risks. And this is a good thing, because without risk, there is no potential reward.
Social engineering attacks
28.04.2020
With how connected the Internet is today, a lot of information that we couldn’t afford to share is potentially within the grasp of the most inventive malicious predators online.
Risk management in healthcare
28.04.2020
Our health information is a private issue. For a number of reasons, people’s health information being shared could result in negative consequences.
Project management tools
28.04.2020
Project management software also provides us a range of benefits, from scheduling events to creating project plans, and there are certain methods and tools that, if taken into account, provide a multitude of benefits and evade numerous risks that make it worth obtaining
Employee time tracking
27.04.2020
On both fronts, time tracking software stands to render the lives of employees and employers much easier.
Employee monitoring software: is it illegal?
24.04.2020
The first question one might ponder is: “Is it illegal to monitor employees’ computers?” The issue of employee monitoring has become a bit of a contested topic in recent years.
Indispensable services during lockdown
10.04.2020
Solutions we use for remote working and industries we need for isolated living
Morrisons' implication has been ruled out
02.04.2020
And the company might “set precedent”, according to The Telegraph
Is there a safe way of using apps?
02.03.2020
And what is more dangerous: spyware or mere negligence when using digital services?
Five sectors that benefit most from employee monitoring software
19.02.2020
Improvements in technology have radically changed the way we work