Veriato Blog

Tag Results

  • Data Security Requirements for Federal Contractors

    by Patrick Knight | Jul 12, 2018
    • Data Security
    • Data Protection
    Data security requirements for federal contractors are complicated and stringent. You should have legal counsel and security experts to help you manage compliance, but here’s an overview of a few of the government’s recent data protection requirements for federal contractors.
    Full story
  • How Technology Protects Against Wrongful Termination Claims

    by Dominique Cultrera | Jul 05, 2018
    • Employee Behavior
    • Monitoring
    Using technology to monitor employee behavior and keep records can be a key asset should a terminated employee file a wrongful termination claim. Demonstrating repeated behavior along with a record of times the behavior was addressed can help protect your company against wrongful termination claims.
    Full story
  • Data Security Considerations for Your Work From Home Policy

    by Patrick Knight | Jul 03, 2018
    • Work From Home
    • Data Security
    Work from home policies have soared in popularity. Your task as an organization is finding a way to provide a work from home policy to your employees without compromising your data security. Take these data security considerations into account when creating your work from home policy.
    Full story
  • The Severity of Cyber security Threats

    by Veriato | May 09, 2018
    • vulnerable organizations
    • cyber security
    Cyber security threats are being realized by vulnerable organizations large and small. The fallout of these breaches can be complete loss of consumer trust. Ongoing detection and prevention of cyber security threats is vital to maintaining a successful business.
    Full story
  • Best practices for securing your data when terminating an employee

    by Veriato | May 02, 2018
    • Data Security
    • Employee Risk
    • Insider Threat
    Best practices for securing your data when terminating an employee start at the onboarding process and continue after the employee has left the company. Make sure the employee is the only thing you lose by securing your data when terminating an employee.
    Full story
  • Employee Monitoring Ethics | Ethically Monitoring Employees

    by Larry Thompson - President, Veriato | Apr 19, 2018
    • Workplace Monitor
    • Employee Productivity
    • Employee Monitoring
    Is employee monitoring ethical? Organizations have a right to protect their data and a responsibility to their employees and clients. By following these best practices for ethically monitoring employees you will create a workplace where employees and data are safe, valued and trusted.
    Full story
  • The Benefits of Starting A User Activity Monitoring System

    by Veriato | Apr 18, 2018
    • User Activity Monitoring
    If you’re on the fence about starting a user activity monitoring system (UAM) across devices or networks, you’re probably wondering if it’s worth the investment. The truth is, an effective user activity monitoring system improves productivity and network security and brings issues to light.
    Full story
  • GDPR Mandates Immediate Data Breach Reporting

    by Veriato | Apr 12, 2018
    • GDPR
    • Employee Monitoring
    • Behavior Analytics
    GDPR mandates that notification must be given when a breach is likely to “result in a risk for the rights and freedoms of individuals”. This means immediate data breach reporting to the proper authorities for any chance of a personal data breach within the allotted 72-hour time frame.
    Full story