Blog - SearchInform

Blog

Insider Threat Awareness

25.10.2022

Types of insider threats and insider threat mitigation.


Insider Employee monitoring Human factor

Top 10 Cybersecurity Threats

15.09.2022

What are the bigget information security threats this year?


Insider Email Fraud

Insider Threat Statistics for 2022 The seriousness of insider threat

11.08.2022

What is an insider threat and who is an insider? What types of insider threats exist? How to detect an insider threat and what is required to do in order to mitigate risks? You may refere to the article and find out.


Insider Risk assessment Internal threat

Major fraud cases in healthcare revealed this year

26.11.2021

Pfizer discovers an insider working for a competitor, whereas Genentech hit the news with a deep-rooted story months ago.


Insider Risk management Fraud

Insider check: could you be damage to your company?

27.01.2021

The test will define you as a certain type of insider. Remember: any employee could become a culprit of a leak, however, circumstances are different. We don’t mean to pretend “scientific”, we intend to make this test entertaining and informative.


Insider Internal threat Risk management

How to stop hackers

06.07.2020

Hacking isn’t quite as flashy as in the movies and it takes a major time investment on the criminal’s part, however it is every bit as damaging and threatening to companies as it is portrayed


Insider Employee monitoring Risk management

Insider threat statistics

10.08.2019

A company having its secrets and confidential information stolen, its funds robbed, or damage caused to it is an ever-present threat that companies may take appropriate measures to avoid.


Insider Internal threat Employee monitoring

Insider threat tools

09.07.2019

While all the hype about unknown threats breaching a company’s privacy, stealing its confidential information and company secrets, purposefully inflicting damage to its public image, and robbing it of its funds is worth keeping in mind to protect against, the losses that would result from that actually occurring are not as great as most people believe.


Insider Employee monitoring Fraud

Illegal business arrangements

11.06.2019

Employees can create their own legal entities that will interact with an employer company. For example, fraudsters can use their job positions and promote their own enterprise as a counterparty and at the same time offer disadvantageous terms and conditions of cooperation.


Insider Email Database

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.