Blog - SearchInform

Blog

Resonant cases of data leakages in APAC region

22.12.2022

There is a step change taking place in the number of data-related incidents and that is critical.


Employee monitoring

In(secure) digest: lost accounts, compensations for mega leaks and “quick as the wind” leaks

01.12.2022

This time we’ve gathered data on serious incidents: attacks on large companies, phishing, forgetful employees, whose actions led to the loss of clients’ data.


ransomware Third party Human factor

Notifiable Privacy Breaches

22.11.2022

What is required to do if a data breach incident somehow takes place?


Compliance Personal data DLP

MSSP Business Model

21.11.2022

What is MSSP? When and for whom is it helpful?


Employee monitoring Risk management Compliance

Cyber Threats to National Security

18.11.2022

National Cybersecurity: this is how the cyber threat has intensified


ransomware Risk assessment

What Are the Major Security Threats That Can Be Expected Through an Email?

07.11.2022

Typical email threats and how to counter them


Email ransomware

Data Loss Prevention Use Cases

04.11.2022

This article will help you to learn how to avoid losing data.


DCAP DLP Human factor

Benefits of Managed Security Services

02.11.2022

How to implement efficient information security protection with MSSP?

in(Secure) digest: stellar social engineering, exposed servers and giants under attacks

01.11.2022

The most resonant information security incidents in our October digest: Toyota’s contractor exposed part of the code, an undercover astronaut, Australian companies experiencing cyberattacks, a massive Microsoft clients’ data leak.


Personal data

Cybersecurity Statistics

28.10.2022

Numerous cybersecurity issues: serious threats to businesses


Human factor ransomware Risk management

Recent Cyber Incidents

27.10.2022

Rise in ransomware attacks and global threats


DLP Fraud ransomware

Famous Data Breaches

26.10.2022

General Data Protection Regulation, fines, real cases.

Insider Threat Awareness

25.10.2022

Types of insider threats and insider threat mitigation.


Insider Employee monitoring Human factor

Recent Security Breaches

24.10.2022

Young employees, zero trust security and other security breach risks.


Employee monitoring ransomware Third party

Healthcare Cyber Attacks

21.10.2022

What makes healthcare organizations a popular target for cyber attacks?


Compliance Personal data ransomware

Financial Fraud Cases

20.10.2022

The biggest investment fraudsters


Fraud

Leaked Credit Card

19.10.2022

The most significant cases.


Personal data Third party Email

Best Network Security Software

18.10.2022

What should you look for when choosing a provider of best network security software?


Risk assessment Risk management

(in)Secure digest: boredom motivated attacks, love to fines and ethical hack

17.10.2022

We’ve compiled a selection of information security incidents, which became publicly known in September. Here we have: trustful employees, hack for joy and Morgan Stanley bank holding, which seems to enjoy paying fines for clients’ data losses.


Risk management Human factor Investigation

Cybersecurity Report

17.10.2022

The biggest challenges and greatest threats in IT security.


Human factor ransomware Employee monitoring

Fraud Cases

14.10.2022

How to detect some common types of fraud and what may you do about it


Fraud Risk assessment Human factor

Outsourcing Security Services

05.10.2022

Internal and external information security personnel


Risk management Compliance

Cybersecurity Threats and Issues 2022

04.10.2022

Records and trends in cybersecurity.


ransomware Personal data Compliance

Cyber Attacks on Critical Infrastructure

03.10.2022

Critical infrastructure: current situation and best cybersecurity practices


DLP Risk assessment Employee monitoring

Best Practices for Network Security

30.09.2022

The ultimate guide to securing your industrial network using the best network security practices

Cybersecurity Investigations

29.09.2022

What is required to conduct a cybersecurity investigation


Investigation Insider Risk assessment

Examples of Cybercrime Cases

27.09.2022

What is cybercrime and examples of a few biggest cybercrimes


Fraud ransomware Email

Biggest Cyber Attacks in History

26.09.2022

An overview of some of the most notorious cyberattacks

Emerging Cyber Threats

22.09.2022

An overview of cyber threats, endangering companies and organizations worldwide in 2022.


Human factor Fraud Insider

Data Privacy Day

19.09.2022

What is The European Data Protection Day and why data privacy is so important

Top 10 Cybersecurity Threats

15.09.2022

What are the bigget information security threats this year?


Insider Email Fraud

Best SIEM Tools

14.09.2022

What is a SIEM system and how to choose one?


Risk management Compliance

Worst Data Breaches

14.09.2022

Prerequisites and consequences of data breaches

Biggest Corporate Frauds

13.09.2022

An overview of some biggest cases of corporate frauds in history.


Fraud Personal data User behavior

Best Computer Security Protection

05.09.2022

How to ensure best computer security protection?


Devices Fraud

Best Endpoint Protection

05.09.2022

What is an efficient endpoint protection and a slight overvierw of best solutions.


Devices Fraud Blocking

(In)secure digest: the smell of data leaks, deep fake in the Zoom and an option of becoming the nobility member for only €1000

01.09.2022

In August many employees are still on a vacation, however, this doesn’t refer to fraudsters, judicial and law enforcement system representatives. In our traditional digest among other you’ll find – one more shot in the foot and another example of peoples’ craving for a fairy tale.


Personal data Fraud Human factor

Insider Threat Statistics for 2022 The seriousness of insider threat

11.08.2022

What is an insider threat and who is an insider? What types of insider threats exist? How to detect an insider threat and what is required to do in order to mitigate risks? You may refere to the article and find out.


Insider Risk assessment Internal threat

(In)secure digest: lawsuit for leaks, insidious phishing and record leak of personal data

29.07.2022

The time has come to discuss if July was full with cyber incidents. As usual, we’ve gathered the most impressive cases, reported by mass media. Here we have unreliable suppliers, long-suffering Marriott, experiencing new data leaks and not very responsible personal data operator, which seems not to care about clients at all.


Risk management Personal data Investigation

(In)secure digest: personal data newsletter, hacked state services and endangered farmers

07.07.2022

The time has come to reveal some “classic” and non-trivial information security incidents. As usual, we’ve gathered some of the most impressive cases of the month in our digest.

Important trends in corporate security

21.06.2022

In this article we continue to deal with the topic of corporate security, and we’ll provide a slight overview of some information security trends and advice on how top-managers may eliminate the ongoing risks.

New concept of organization’s security

20.04.2022

It seems that the time has come to elaborate new approach to the concept of organization security


Internal audit Human factor User behavior

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.