Blog - SearchInform

Blog

Connected Devices Remain the Most Popular Data Leakage Channel

04.12.2023

SearchInform together with its partner NEXTA ÇÖZÜM surveyed representatives of 100 Turkish leading companies to find out how their experts ensure data leaks protection, whether they are planning to increase data security budgets and what data channels their security officers consider the riskiest.


Risk management Email Devices

(In)Secure Digest: The Case of Classic Phishing Attack, Scammers Among the Team and the Dangerous Vulnerability

30.11.2023

In this November digest we gathered interesting and illustrative incidents related to data leaks, fraud and hacks.


Personal data Fraud Former employees

Ways to Ensure Children’s Safety on the Internet: Cybersecurity Experts’ Views and Advice

20.11.2023

On the occasion of World Children’s Day, we share an article, containing recommendations and a few tools, which can help to protect children from inappropriate content on the Internet.


Risk management Risk assessment Personal data

Deepfake Science Basics: How are They Created and how to Detect Them

14.11.2023

Alex Drozd, CISO of SeachInform, sheds light on deepfakes and how they are created.


Risk management Risk assessment

(In)Secure Digest: a Leak via Contractor, Hack of Airline and Case of Corporate Fraud

01.11.2023

At the end of the month, traditionally, we’ve  gathered a selection of high-profile IS incidents.


Personal data Insider Former employees

Which Aspects of Information Security it’s Crucial to Address for SMEs?

26.10.2023

Learn more about the methods of cyber-attacks that SMEs owners should be aware of.


Fraud Risk management Internal threat

Cyber Attack Detection: What are the Risks of Delay in the Detection and Response and how to Speed up the Attack Discovery Process?

13.10.2023

Read the article to find out how to detect a cyber attack just in time and what are the best practices are for detecting cyber attacks.


Risk assessment Risk management Fraud

A Case in Point: You’ve got Mail

03.10.2023

Recently, it was the birthday of electronic mail. To celebrate the occasion, we would like to share the case study from our practice that involves email.


Risk assessment Investigation DLP

(In)Secure Digest: Pizza Lovers' Data Theft, a Million-dollar Fine and Aircraft Suppliers’ Data Leak

03.10.2023

It's time for the traditional monthly review of "classic" and non-trivial IS incidents reported by the media.


Personal data Insider Internal threat

Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed

29.09.2023

In this article we will examine, DLP class systems reproaches are fair and which ones are unfair and will reveal, which limitations are typical for all DLP systems and which are in fact disadvantages of some specific products.


DLP Risk management Risk assessment

E-mail Compromise: How to Protect Business Against BEC-attacks

27.09.2023

The senior analyst at SearchInform, Sergio Bertoni reveals, why BEC attacks are so popular and how to protect against them.


Email Fraud Risk assessment

SearchInform Solutions’ 2023 Updates: Migration to PostgreSQL, Informative Metrics and Control of FTP Connected Servers

20.09.2023

In the digest on SearchInform solutions’ updates we’ve gathered details on a few major updates up to date.


Risk management Messengers, social media, apps DCAP

How to Train Employees in Information Security Related Issues Efficiently

18.09.2023

In this article, Sergio Luis Bertoni, Leading Analyst at SearchInform will share my observations, based on the practical experience in the sphere of educational courses development.


Internal threat Human factor Risk management

A Case in Point: Set a Search Rule to Catch a Thief

15.09.2023

It's time to present a compelling case study that underscores the criticality of maintaining comprehensive visibility into your organization's file system.


DCAP Internal audit Internal threat

(In)Secure digest: “shadowy” Amazon, de-anonymization of Northern Ireland police officers and pseudo-hackers

31.08.2023

Plenty of confidential data related incidents happened this month: in Australia, the data of participants in a cybersecurity survey was inadvertently disclosed, in Northern Ireland data on all police officers was disclosed, and in India, an employee was caught leaking data (once again).


Personal data Insider Fraud

SearchInform SIEM system – out-of-the box analytics and proactive incident management

21.08.2023

Nowadays, the number of both internal and external information security threats is growing steadily. Employees in charge of numerous organizations worldwide tend to understand the necessity to implement a SIEM class solution, which detects security events within the digital infrastructure.


Risk management Risk assessment Internal threat

(In)Secure Digest: a patented data leak, Bangladeshi open register and water treatment plant hack

03.08.2023

The time has come to find out if July was full with information security incidents. In our traditional digest we've gathered the most memorable incidents.


Risk management Insider Former employees

A case in point: The thirst for revenge

14.07.2023

Over the years of working, we have collected a large number of interesting cases. Some of them are amusing, some of them are surprising, but most of them has prevented serious losses for our clients. So, we figured: Why not share them with you?


Internal threat Risk assessment Risk management

Sales Manager Training for Partners

12.07.2023

Yamen Mustafa, Regional Managing Director Middle East and North Africa and Mohamed Salah Sayari, International Sales Manager and Business Development African Network, will provide a Sales training for our partners.

Human Vulnerabilities in Cyber Security

03.07.2023

As technology continues to advance, one persistent problem remains: the vulnerability of humans to cyberattacks.


Risk assessment Risk management Third party

(In)Secure Digest: theft of national secrets, a rogue VPN, and a fine for security guards' curiosity

29.06.2023

Here's our monthly roundup of noteworthy information security incidents from June.


Personal data Internal threat Former employees

Implementation department specialists' workdays: millions of questions and the requirement to know literally everything

27.06.2023

Implementation department employees can help customers to quickly manage to work with our solutions and benefit as much as possible from the software usage.


Risk management Human factor DLP

MSSP vs MDR

21.06.2023

MSSP vs MDR: what should you choose? This article will help you understand which one suits to your business needs better.


Risk assessment Risk management Compliance

Risks of neural networks and chat bots usage

19.06.2023

SearchInform expert reveals artificial intelligence usage related risks and shares advice on how to mitigate them.


Human factor Risk management Machine learning

How to put on a vacation

05.06.2023

Summer is a really busy time for us. A lot of flights, trips, and then... well, vacations! For CISOs, the travel and vacation period can be a very difficult time. That’s why we implement a few strategies to ensure secure access and help employees not to forget all the IS rules while they're on the road. Let's have a look at the checklist and find out, how we do it.


DCAP DLP

(In)secure digest: data leaks with mileage, refuse to use AI and hack of an account

31.05.2023

The time has come for our traditional gather of so-called classic and extraordinary information security incidents, which were reported by mass media. In this digest we’ll reveal details on the following cases: data incident, which had lasted for ten years; hack of account of the employee, who hasn’t even set to work; unexpected cyber holidays.

Risk Management Certification

24.04.2023

Let's consider one of the most significant frameworks for managing risk is ISO 31000, an international standard that provides principles, best practices, and guidelines for managing risk in organizations.


Risk management Risk assessment Compliance

More than half of companies limit their protection with nominal information security literacy

06.04.2023

A research on how companies prefer to train employees in information security and what methods do they implement


Human factor Compliance Risk management

(In)Secure digest: if there was the “Darwin Award” in information security sphere – 2023 edition

05.04.2023

In this April compilation, you’ll find details on aquarium fraudsters, the financial manager, who squandered the company's money, "super-secure" apps, but something went wrong with them and much more.

EPP vs EDR

31.03.2023

What is the difference between EPP and EDR? Do they complement each other or they should be used separately?

PCI certification

29.03.2023

PCI DSS and PCI Certification: All You Need to Know


Personal data Compliance Confidential documents

Certified Risk and Information Systems Control (CRISC)

27.03.2023

Сybersecurity and risk management certification: ISACA and ISC


Risk management Risk assessment

Best Digital Forensics Certifications

24.03.2023

The article helps you answer the three most important questions when choosing the right IT security and digital forensics certification.

(In)secure digest: enormous data leaks and insider’s revelations

02.03.2023

The time has come to discuss major data realted incidents, which happened in February.


Personal data Confidential documents Database

Which sources should be controlled by the SIEM system first of all?

22.02.2023

It is very useful to maximize the SIEM system load to make sure that you won’t face a situation when something does not work appropriately in the real-life circumstances.


Risk assessment review

The SearchInform DLP deals with the smartphone threat

16.02.2023

Learn how the SearchInform DLP functionality helps to detect, whether an insider has a smartphone in hands.


Internal threat Insider Employee monitoring

What Are the Major Security Threats That Can Be Expected Through an Email?

16.02.2023

Learn more about the email risks and how to counter them.

The SearchInform DLP detects phishing and why would you need this functionality in the DLP class tool?

13.02.2023

Learn how the atypical DLP functionalty enhances your corporate protection.


DLP Email

(In)secure post New Year digest: “temporary” failures, corporate insider and data on everyone

02.02.2023

The time has come to discuss what happened while we were on a vacation.


Database Employee monitoring Insider

SIEM: Use Cases

04.01.2023

We will examine more precisely top SIEM use cases.


review Risk assessment Compliance

UEBA: Use Cases

03.01.2023

UEBA systems and reveal their peculiarities


User behavior Human factor Employee monitoring

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.