Veriato Blog

  • The Benefits of Starting A User Activity Monitoring System

    by Veriato | Apr 18, 2018
    • User Activity Monitoring
    If you’re on the fence about starting a user activity monitoring system (UAM) across devices or networks, you’re probably wondering if it’s worth the investment. The truth is, an effective user activity monitoring system improves productivity and network security and brings issues to light.
    Full story
  • GDPR Mandates Immediate Data Breach Reporting

    by Veriato | Apr 12, 2018
    • GDPR
    • Employee Monitoring
    • Behavior Analytics
    GDPR mandates that notification must be given when a breach is likely to “result in a risk for the rights and freedoms of individuals”. This means immediate data breach reporting to the proper authorities for any chance of a personal data breach within the allotted 72-hour time frame.
    Full story
  • General Data Protection Regulation Compliance Objectives

    by Veriato | Apr 09, 2018
    • GDPR
    • Employee Monitoring
    • Behavior Analytics
    The EU General Data Protection Regulation (GDPR) is the most significant regulation regarding data privacy in over 20 years. Starting May of 2018 the new GDPR will be fully in effect and General Data Protection Regulations compliance will be strictly enforced for the good of all EU citizens.
    Full story
  • The Growth of AI and Employee Monitoring In the Workplace

    by Mike TIerney | Apr 03, 2018
    • Employee Productivity
    • Employee Monitoring
    • Behavior Analytics
    • Analysis
    • Alerting
    Recently the Economist published two articles that discussed the increasing us of AI and employee monitoring in the workplace. We wanted to add additional insights as a leader in employee monitoring software as the use of AI and employee monitoring in the workplace continues to grow.
    Full story
  • Internet of Things security practices for your business

    by Patrick Knight | Mar 22, 2018
    • wearbables
    • internet-enabled devices
    • Internet of Things
    The Internet of Things (IoT), or internet-enabled devices that collect and act upon data, is becoming more popular with ever-increasing applications. Far beyond a smart coffee pot that automatically gets the brew going to start the workday, the Internet of Things is changing security in a big way.
    Full story
  • 5 employee cyber security training questions you need to ask

    by Patrick Knight | Mar 15, 2018
    • Best Practice
    • onboarding
    • cyber security
    Chances are your organization already addresses cyber security training in new employee onboarding. Most employees know that their companies have cyber security protocol and best practices. But how many of your employees actually know what the protocol and practices are?
    Full story
  • Why Zero Trust Is Not As Bad As It Sounds

    by Patrick Knight | Mar 01, 2018
    • Insider Attacks
    • Zero Trust
    Zero Trust means organizations never implicitly trust anyone with their sensitive data. Instead of using a blanket network perimeter, Zero Trust networks implement a series of micro-perimeters around data so only users with clearance to access certain data points can get to them.
    Full story
  • 4 reasons why cyber security deserves a larger chunk of your hospital organization’s budget

    by Veriato | Feb 22, 2018
    • Veriato
    • HIPAA
    • Data Security
    Health organizations are allocating less than half of what other industries budget for Information Security. This is no longer sufficient for a field with such high-value assets, and many factors play into the need for increased cyber security in hospitals and the medical arena.
    Full story

Search Blog Posts

Filter Blog Posts