Veriato Blog

Tag Results

  • Healthcare's Insider Threat

    by Jesica Lawrence | Dec 10, 2018
    • Insider Threat
    • Insider Attacks
    • Healthcare
    Veriato's Pete Nourse on Why This Is the Sector's Achilles Heel
    Full story
  • Election Interference Attacks More than Voting Machines

    by Patrick Knight | Nov 02, 2018
    • Insider Threat
    • Hacking
    • Election
    When election interference is discussed, you probably think of hacked voting machines. But interference can come in many other forms.
    Full story
  • Best practices for securing your data when terminating an employee

    by Veriato | May 02, 2018
    • Data Security
    • Employee Risk
    • Insider Threat
    Best practices for securing your data when terminating an employee start at the onboarding process and continue after the employee has left the company. Make sure the employee is the only thing you lose by securing your data when terminating an employee.
    Full story
  • Insider Threats Are the Greatest Risk to Your Data—Here’s How to Stop Them

    by Veriato | Oct 23, 2017
    • Insider Threat
    Most companies have already hunkered down to prevent hackers from stealing proprietary data. Their security teams have almost certainly installed powerful firewalls. Some companies may have acquired robust security systems to protect themselves against ransomware, the malicious code that cyber criminals use to encrypt your data and hold it hostage until you pay a hefty ransom.
    Full story
  • Additional Insight into Quantifying Insider Risk

    by Veriato | Jun 29, 2017
    • Insider Threats
    • Insider Risk
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    Never before have there been so many platforms that let a growing number of people touch, manipulate, download, and share sensitive data.
    Full story
  • Why Trust is not Enough

    by Veriato | Jun 15, 2017
    • User Behavior Analytics
    • User Activity Monitoring
    • Insider Threats
    • Insider Threat Prevention
    • Insider Attacks
    • Insider Threat
    • Employee Monitoring
    Why high risk positions need to be monitored closely to help combat insider threats, and how User & Entity Behavior Analytics and User Activity Monitoring can help.
    Full story
  • How to Prevent Departing Employees from Pocketing Your IP

    by Veriato | May 08, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    When George, a senior salesman, started his current position 10 years ago, he brought hundreds of business cards and notes that he added to his employee’s customer management software. When he decided to leave, he thought he could take the current database with him. Not true.
    Full story
  • Step 5 of 5 to Quantifying Insider Risk

    by Mike Tierney | Feb 14, 2017
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threats
    • Insider Attacks
    One of the best practices found in the Common Sense Guide to Mitigating Insider Threats is the need to develop an employee termination process that takes into account the threat a departing employee can pose.
    Full story