Blog - SearchInform

Blog

Connected Devices Remain the Most Popular Data Leakage Channel

04.12.2023

SearchInform together with its partner NEXTA ÇÖZÜM surveyed representatives of 100 Turkish leading companies to find out how their experts ensure data leaks protection, whether they are planning to increase data security budgets and what data channels their security officers consider the riskiest.


Risk management Email Devices

Ways to Ensure Children’s Safety on the Internet: Cybersecurity Experts’ Views and Advice

20.11.2023

On the occasion of World Children’s Day, we share an article, containing recommendations and a few tools, which can help to protect children from inappropriate content on the Internet.


Risk management Risk assessment Personal data

Deepfake Science Basics: How are They Created and how to Detect Them

14.11.2023

Alex Drozd, CISO of SeachInform, sheds light on deepfakes and how they are created.


Risk management Risk assessment

SearchInform Solutions’ 2023 Updates: Migration to PostgreSQL, Informative Metrics and Control of FTP Connected Servers

20.09.2023

In the digest on SearchInform solutions’ updates we’ve gathered details on a few major updates up to date.


Risk management Messengers, social media, apps DCAP

SearchInform SIEM system – out-of-the box analytics and proactive incident management

21.08.2023

Nowadays, the number of both internal and external information security threats is growing steadily. Employees in charge of numerous organizations worldwide tend to understand the necessity to implement a SIEM class solution, which detects security events within the digital infrastructure.


Risk management Risk assessment Internal threat

(In)Secure Digest: a patented data leak, Bangladeshi open register and water treatment plant hack

03.08.2023

The time has come to find out if July was full with information security incidents. In our traditional digest we've gathered the most memorable incidents.


Risk management Insider Former employees

Implementation department specialists' workdays: millions of questions and the requirement to know literally everything

27.06.2023

Implementation department employees can help customers to quickly manage to work with our solutions and benefit as much as possible from the software usage.


Risk management Human factor DLP

Risk Management Certification

24.04.2023

Let's consider one of the most significant frameworks for managing risk is ISO 31000, an international standard that provides principles, best practices, and guidelines for managing risk in organizations.


Risk management Risk assessment Compliance

Certified Risk and Information Systems Control (CRISC)

27.03.2023

Сybersecurity and risk management certification: ISACA and ISC


Risk management Risk assessment

(in)Secure digest: boredom motivated attacks, love to fines and ethical hack

17.10.2022

We’ve compiled a selection of information security incidents, which became publicly known in September. Here we have: trustful employees, hack for joy and Morgan Stanley bank holding, which seems to enjoy paying fines for clients’ data losses.


Risk management Human factor Investigation

Outsourcing Security Services

05.10.2022

Internal and external information security personnel


Risk management Compliance

Best SIEM Tools

14.09.2022

What is a SIEM system and how to choose one?


Risk management Compliance

(In)secure digest: lawsuit for leaks, insidious phishing and record leak of personal data

29.07.2022

The time has come to discuss if July was full with cyber incidents. As usual, we’ve gathered the most impressive cases, reported by mass media. Here we have unreliable suppliers, long-suffering Marriott, experiencing new data leaks and not very responsible personal data operator, which seems not to care about clients at all.


Risk management Personal data Investigation

Business continuity and information security integration

13.12.2021

How to make security part of a general risk prevention and mitigation program


Risk management Risk assessment Investigation

How to surf the flow of information security events: use SIEM system correctly

26.02.2021

Security Information and Event Management works on the principle of video surveillance. Cameras stand for connectors that collect data from hardware and software, whereas the object of the surveillance is an IT infrastructure featuring PCs, network devices, and servers. When configured properly, SIEM simplifies the monitoring of information security. How to organize the work, what to control first, and how to respond to incidents? - we will answer these questions using the example of SearchInfo


Risk management Internal threat Devices

The Darwin Awards in Information Security World

09.09.2020

...or 7 stories about stupidity, careless work, credulity and their consequences


Risk management Human factor Risk assessment

Ensuring security and compliance in multi-departmental teams

26.08.2020

As different departments have their own specific risk management frameworks they lack correlation and coordination - enterprise risk management ensures consistency.


Risk management Compliance Confidential documents

Use case: access control and change management

06.08.2020

The solution boosts risk assessment ensuring that access rights are properly managed and privileged user activity is under control, data access policies are in place and kept updated.


Risk management Compliance Internal audit

The information security team

26.06.2020

Cyber criminals are working very hard to discover top-secret company information in order to sabotage it or sell the information to other companies.


Risk management Risk assessment Internal threat

The rise of virtual private networks

22.05.2020

Everyone is well aware that criminals on the internet are becoming savvier every day.


Risk management Remote employees Confidential documents

Staying ahead of malware

21.05.2020

With all the benefits that the worldwide connectivity of the Internet offers, so too come the vulnerabilities.


Risk management Confidential documents Risk assessment

As businesses keep staying remote. Use cases

18.05.2020

Which instruments can be installed and how do they help?


Risk management Employee monitoring Remote employees

Risk management

29.04.2020

No matter what you do in life, there are always risks. And this is a good thing, because without risk, there is no potential reward.


Risk management Risk assessment DLP

How to max out SearchInform services

12.12.2019

Do you consider launching comprehensive monitoring of your internal business processes and even reinvent business continuity management strategy but aren’t sure you want to delve into risk management program and hire extra staff, assign your specialists to the new job and purchase the system to integrate it with your business architecture and implement all the control? If you do – read and learn how to establish a smoothly supervized workflow and not to the detriment of your primary activities.


Risk management Employee monitoring Investigation

Risk management matrix

14.10.2019

We take risks every day, from the moment we wake up until we go to bed at night, as they are a normal part of life.


Risk management Risk assessment

Security risk management assessments

20.09.2019

Security risk assessments are performed for the purpose of identifying, evaluating, and prioritizing risks associated with a company’s use and operation of information systems to its operations and assets.


Risk management Risk assessment Internal threat

Business continuity

16.07.2019

Considering the significant amount of money most people have invested in their businesses, it is important that the full rewards of it can be reaped.


Risk management Risk assessment Internal threat

What is Risk Mitigation Strategy? Define Risk Evaluation Plan

24.06.2019

To define risk mitigation, let us first specify what risk is. “Risk” is the possibility of loss. Thus, risk mitigation entails a concentrated effort to reduce adverse effects.


Risk management Risk assessment Investigation

What is Risk Management? Solutions, Strategies, Services & Tools

16.06.2019

Anyone who has ever been involved in business knows that there is risk everywhere. What is risk management?


Risk management Confidential documents Risk assessment

Information Security Incident Management | IS Incident Management

10.05.2019

The system of data leakage protection is based, above all, on the detection, prevention, registration and mitigation of information security incidents or events that violate regulated procedures.


Risk management Compliance Investigation

Methods to Protect Information | Methods and Tools for Data Protection

18.04.2019

Computer data is prone both to loss due to malfunction or destruction of equipment, and to theft. Protection methods include the use of hardware and devices, as well as specialized technical tools with software.


Risk management Third party Risk assessment

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.