January 21st, 2019
Penetration
testing is one of the best ways to find the flaws in your network’s security
and figure out what needs to be patched. It is an essential part of any
security-minded company’s process and regular security audits are paramount to
keeping sensitive data safe.
Luckily,
there are a plethora of tools to help get this important job done. A few tools
in particular are especially popular among security professionals to help them
penetration test their company’s network.
Read More
September 28th, 2018
Cold boot attacks have been a tool that hackers have used to gain access to data for many years now, with the first vulnerability being discovered in 2008. Most of these old vulnerabilities have since been patched, but there is a new one that has recently been discovered and could already be used to steal corporate data.Read More
September 20th, 2018
According to the Glassdoor, the average company in the United States spends almost $4,000 to hire a new employee and about 24 days to fill the position.
The costs are many including sourcing candidates (job boards, career fairs, website postings, referral rewards, external recruiters, etc.), screening candidates by telephone and in person, testing (hard and soft skills) plus negotiating an acceptable offer. Add to that the cost of training which is estimated at $1,075 per learner according to the 2017 Training Industry Report and you are looking at a tidy sum to attract, train and retain top talent. If they leave for any reason, you are tasked with repeating this process (and cost) all over again.
Read More
September 17th, 2018
Employee monitoring is an incredibly useful tool for any company. Not only is it handy to make sure that your employees are doing the work that they’re supposed to be doing, but it can provide useful stats regarding their work habits and how they spend their time.
Yet, with all this data, it can be difficult to figure out how to best utilize this information to help boost your employees’ productivity. While there is limitless potential with the data you collect, there are a few key things you can start with that should give you good results right off the bat.Read More
September 12th, 2018
In the old days, protecting trade secrets was relatively straightforward. You kept many of these items on paper, locked up in special spots. Today’s environment is so different, it’s hard to know where to begin.
Companies worry a great deal about insider threats – the idea that any disgruntled employee or someone infiltrating the company’s physical or digital space is going to get their hands on trade secrets, customer information, financial details or anything else that can have a negative impact on the company’s operations and reputation.
Read More
September 5th, 2018
Are you concerned about government employee fraud (cheating for profit) and embezzlement (misappropriation of funds)? After all… it’s your tax dollars!
Insider threats are a part of any organization in government and industry. According to Transparency International in their latest Corruption Perceptions Index report on public sector corruption – over 68% of 180 countries failed a passing grade. The USA performed reasonably well (75/100 score), but is not without its own challenges.Read More
August 20th, 2018
According to CIO DIVE “Insider Threats” are the #1 cybersecurity concern in 2018.
By definition, insider threats include any malicious attack on an organization from current or past employees, business associates or anyone with access to the company’s proprietary data that could be used against them in a detrimental way. Read More