Blog
I resolve to… leave those security errors for good in 2021
27.12.2021
The resolutions for businesses to begin the New Year without old mistakes finally cleaning up the awareness mess which never seems to be untangled
Why dismissed employees take revenge and what prevention measures to implement
17.12.2021
Revenge hacks and what prevention measures to take
Business continuity and information security integration
13.12.2021
How to make security part of a general risk prevention and mitigation program
Major fraud cases in healthcare revealed this year
26.11.2021
Pfizer discovers an insider working for a competitor, whereas Genentech hit the news with a deep-rooted story months ago.
What kind of DLP system do you need in 2022?
08.11.2021
David Balaban reflects on the DLP vendors' race for attention, adding of new features, sometimes going beyond the boundaries.
The more they know the less they care
18.10.2021
More and more people are unwilling to share their personal data with third parties
Facebook security upgrade decision leaked
15.10.2021
The company decided to exempt a number of employees from groups which have access to internal message boards.
How to tell the difference between a phishing email and a real one?
07.10.2021
Don't become a phisher’s target, it's avoidable.
Multi-party breaches vs third-party related incidents
30.09.2021
Ripple events are nearly untraceable and affect hundreds of companies
Data overexposed in manufacturing sector
21.09.2021
The relevant statistics and most common security issues in 2021 so far
Users are monitored by gadgets Should we turn down everything digital?
15.09.2021
Who should you trust in a digital world?
How to configure DLP and not to overlook a leak
30.08.2021
How efficient are DLP systems with preset configurations? Can a system be configured once and for good? Learn how to adjust the settings here.
Top 5 actions to be taken by CEO to increase cybersecurity
08.06.2021
Top 5 actions to be taken by CEO to increase cybersecurity and employee trust in the company
Trello boards indexed by major search engines put at peril business processes of Russian companies
04.06.2021
Almost a million Trello boards, thousands of which contain corporate data of large and small Russian companies, were publicly available.
Not all DLP systems are equally helpful
27.05.2021
How to choose a system and not to get disappointed
Why FileAuditor? SearchInform customer gives an elaborate answer
19.05.2021
SearchInform customer – scientific technological pharmaceutical company Polysan – has deployed FileAuditor, a DCAP system, and shared the first impression with the company.
Outsourcing the role of information security officer
23.04.2021
A piece of insight into infosec as an MSSP solution
Order in your files and folders: how to organize access control and protection against leaks
20.04.2021
Expansion of the IT infrastructure complicates controlling who accesses, copies, moves from folders, and deletes information. In case company's confidential files and folders are not organized, it's almost impossible to keep that data secure. The task is solved with specialized DCAP systems.
(In) Secure digest: the hit parade of the most comical infosecurity incidents
07.04.2021
The most comical infosecurity incidents to laugh and learn from it. Enjoy, but tread carefully!
Blocking that does not slow down business processes
05.04.2021
Interview with Sergey Ozhegov, CEO of SearchInform
Is the system really hidden on an endpoint? All about invisible DLP control and where its cloak of invisibility loses powers
02.04.2021
The DLP doesn’t function in a hidden mode for nothing: on the one hand, it doesn’t interfere with the work of respectable employees, on the other hand, it helps to catch insiders off guard.
Fraudsters won’t miss a chance — what threats to people and business remain in 2021
31.03.2021
The “Roaring 20s” is no longer a euphemism from the last century, in the 21st the new decade also began loudly.
How to detect an employee accepting kickbacks using DLP?
24.03.2021
Proven schemes for searching for corrupt individuals in the company.
How to surf the flow of information security events: use SIEM system correctly
26.02.2021
Security Information and Event Management works on the principle of video surveillance. Cameras stand for connectors that collect data from hardware and software, whereas the object of the surveillance is an IT infrastructure featuring PCs, network devices, and servers. When configured properly, SIEM simplifies the monitoring of information security. How to organize the work, what to control first, and how to respond to incidents? - we will answer these questions using the example of SearchInfo
(In)Secure digest: default passwords, sensitive info for free, and phisher salary.
12.02.2021
Every month we collect "classic" and non-trivial incidents on Infosecurity across the world and in Russia in particular. Here is our first digest for 2021.
Insider check: could you be damage to your company?
27.01.2021
The test will define you as a certain type of insider. Remember: any employee could become a culprit of a leak, however, circumstances are different. We don’t mean to pretend “scientific”, we intend to make this test entertaining and informative.
Legal monitoring, smartphones control and your employee personal portrait
20.01.2021
These and other ticklish issues regarding the launch of information security solution within your system.