Veriato Blog

Tag Results

  • Five Common Insider Threat Profiles

    by Dr. Christine Izuakor | May 16, 2019
    • Insider Threat Detection
    • inside threat
    Insider Threats come in many different shapes and forms and can be a frustrating problem to diagnose. Adding to the problem is the fact that even the most reliable and seemingly harmless employees can change in an instant and pose a threat. Protecting your company against these sometimes-unpredictable actors requires an understanding of the various profiles that exist and their motivations. To help, here is a quick look at five of the most common Insider Threat actors that companies may face, and some quick tips on how you can protect your organization from each of them.
    Full story
  • A Quick Guide to Preventing, Detecting & Responding to Insider Threats

    by Dr. Christine Izuakor | May 02, 2019
    • Insider Threat Detection
    Insider Threats tend to take longer to detect than external attacks often increasing the price tag and the impact of these attacks. Adequate detection tools are necessary to contain the incident as quickly as possible and minimize the impact. User and entity behavior analytics (UEBA) can help in this space. The fundamental operating principle of UEBA is to capture a baseline of what average user and organizational behavior look like. Once you have this view, you can begin to compare this to current activity and alert on events that deviate too far from the baseline. Furthermore, UEBA can correlate mass amounts of information and add intelligent context to the logs for high accuracy on what’s considered a viable threat. Having quality logs is critical to accomplish this.
    Full story
  • Insider Threat Detection Software Can Help Increase Employee Productivity

    by Dr. Christine Izuakor | Apr 24, 2019
    • Employee Monitoring
    • Insider Threat Detection
    Imagine that for every 100 employees you’ve hired, 70 of them are underperforming and disconnected from their work like John. No need to imagine too hard as this is the reality for most companies. Gallup reported that in 2018, almost 70 percent of employees were disengaged at work. Furthermore, it’s estimated that those employees can cost the company up to 34 percent of their pay, for a whopping estimated total of $483 - $605 billion lost per year.
    Full story
  • What Is an Insider Threat and the 5 Things You Should Know?

    by Veriato | Feb 22, 2019
    • Insider Threats
    • what is an insider threat
    • ueba
    • UBA
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Gone are the days when our greatest inklings of Insider Threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining. Today, Insider Threats come in a concerning variety of forms with consequences often exceeding millions of dollars. As time passes, more industries than ever before are feeling the sting of security incidents and breaches stemming from their very own trusted employees and partners.
    Full story
  • Serious About Insider Threats? Start Paying Attention to the Dark Web

    by Veriato | Jan 21, 2019
    • Dark Web
    • Insider Threat Detection
    • Insider Threat
    Insiders keen on making money from the valuable data your organization holds need only use a TOR browser to connect with buyers, hackers, and everyone else who doesn’t have your org’s best interest at heart.
    Full story
  • Who to Consider an Insider Threat in Your Organization

    by Veriato | Jan 07, 2019
    • Insider Attacks
    • Insider Threat Detection
    • Insider Threat
    With 53 percent of organizations experiencing at least one insider attack within the last 12 months, it’s imperative to understand who could be an insider threat.
    Full story
  • Additional Insight into Quantifying Insider Risk

    by Veriato | Jun 29, 2017
    • Insider Threats
    • Insider Risk
    • Insider Threat
    • Insider Threat Prevention
    • Insider Threat Detection
    Never before have there been so many platforms that let a growing number of people touch, manipulate, download, and share sensitive data.
    Full story
  • How to Prevent Departing Employees from Pocketing Your IP

    by Veriato | May 08, 2017
    • Insider Threat Prevention
    • Insider Threat Detection
    • Insider Threat
    When George, a senior salesman, started his current position 10 years ago, he brought hundreds of business cards and notes that he added to his employee’s customer management software. When he decided to leave, he thought he could take the current database with him. Not true.
    Full story

Search Blog Posts

Filter Blog Posts