Veriato Blog

  • How Employee Monitoring Keeps Clinical Trial Data Secure

    by Patrick Knight | Aug 15, 2018
    • Employee Monitoring
    Many clinical trial organizations rely on 3rd party services to handle their data. Increasing the number of people who can access data increases the risk of insider threats. Most data breaches are actually caused by insiders, making employee monitoring essential to keep clinical trial data secure.
    Full story
  • Cyber Incident Reporting Compliance for Federal Contractors

    by Patrick Knight | Aug 08, 2018
    • cyber security
    Federal regulations require federal contractors to report a cyber incident “rapidly” – defined as within 72 hours of discovery of the breach. Additionally, in the event of a cyber incident, federal regulations require you to “conduct a review for evidence of covered defense information.”
    Full story
  • Data Security Requirements for Federal Contractors

    by Patrick Knight | Aug 03, 2018
    • Data Security
    • Data Protection
    Data security requirements for federal contractors are complicated and stringent. You should have legal counsel and security experts to help you manage compliance, but here’s an overview of a few of the government’s recent data protection requirements for federal contractors.
    Full story
  • How Technology Protects Against Wrongful Termination Claims

    by Dominique Cultrera | Jul 05, 2018
    • Employee Behavior
    • Monitoring
    Using technology to monitor employee behavior and keep records can be a key asset should a terminated employee file a wrongful termination claim. Demonstrating repeated behavior along with a record of times the behavior was addressed can help protect your company against wrongful termination claims.
    Full story
  • Data Security Considerations for Your Work From Home Policy

    by Patrick Knight | Jul 03, 2018
    • Work From Home
    • Data Security
    Work from home policies have soared in popularity. Your task as an organization is finding a way to provide a work from home policy to your employees without compromising your data security. Take these data security considerations into account when creating your work from home policy.
    Full story
  • The Severity of Cyber security Threats

    by Veriato | May 09, 2018
    • vulnerable organizations
    • cyber security
    Cyber security threats are being realized by vulnerable organizations large and small. The fallout of these breaches can be complete loss of consumer trust. Ongoing detection and prevention of cyber security threats is vital to maintaining a successful business.
    Full story
  • Best practices for securing your data when terminating an employee

    by Veriato | May 02, 2018
    • Data Security
    • Employee Risk
    • Insider Threat
    Best practices for securing your data when terminating an employee start at the onboarding process and continue after the employee has left the company. Make sure the employee is the only thing you lose by securing your data when terminating an employee.
    Full story
  • Employee Monitoring Ethics | Ethically Monitoring Employees

    by Larry Thompson - President, Veriato | Apr 19, 2018
    • Workplace Monitor
    • Employee Productivity
    • Employee Monitoring
    Is employee monitoring ethical? Organizations have a right to protect their data and a responsibility to their employees and clients. By following these best practices for ethically monitoring employees you will create a workplace where employees and data are safe, valued and trusted.
    Full story

Search Blog Posts

Filter Blog Posts