Thwarting Insider Threats

Insider threat prevention solution.

Insider threats are difficult to see and even harder to acknowledge for most organization. “How could our own people be a threat to us?” Yes, this is exactly the type of attitude that leads to successful insider threat actors. Many insider threats come from trusted employees, which is something most employers don’t consider. It’s hard…

Read More

What is an Advanced Persistent Threat?

APT prevention solution.

Advanced Persistent Threats explained. Advanced Persistent Threats (or “APTs”) are a dangerous form of cyber attack where a team of intruders use sophisticated hacking techniques to establish a long-term presence on a network. Their intention is usually to breach highly sensitive data and their methods are always evolving. These APT attacks usually come from very…

Read More

How Mistakes, Forgetfulness, and Carelessness can Undo the Best IT Security

Human error in cyber security.

Some things just can’t be anticipated and protected against. Human foibles are at the top of the list. Human beings aren’t perfect, and their mistakes, carelessness and just plain bad luck can wreak unintentional havoc. Sometimes the simplest error can undo the most intricate IT security plans. All it takes is one person. It could…

Read More

Satori Malware Aims at D-Link Routers

Satori isn’t new malware, but it’s the most infamous of its kind in the IoT world. Satori is a malicious application that scans the Internet for vulnerable devices and adds this vulnerable device to its botnet. It’s terribly effective for botnet creators – good for malware attackers but bad for innocent bystander users. The result:…

Read More

The Rise of Currency Miner Malware

Prevent currency miners.

Crypto currency is in high demand. Not just for everyday people, but for cyber criminals. Insider threats are considered the most malicious of cyber threats. Insiders already have access to everything. This makes the risk level extremely high. Most companies think of a cyber threat as someone who maliciously attacks the network, steals data, or…

Read More

The 5 Vulnerabilities You’re Missing on Your Corporate Network

Defense against cyber vulnerabilities.

When an organization thinks of insider threats, it’s often thought that it means malicious employees stealing data or destroying resources. Insider threats aren’t just employees with malicious intent. It’s also employee negligence either by allowing malware to be installed on the local network or just accidentally leaking data. Whatever the reason, it’s the responsibility of…

Read More

Understanding Your Employee Cybersecurity

A common error with most employee cybersecurity is that what they do is exempt from all other issues in regard to security. The fact is that cybersecurity has a lot to do with the way the public perceives an organization. How employees use customer records have a huge effect on the way your data is…

Read More

When CMS Software Such as Drupal is a Threat

Drupal vulnerability - drupalgeddon2

Sometimes, insider threats are less about people maliciously attacking your network but more about the software you install. Any type of software could have vulnerabilities including what would otherwise seem like innocuous software. Even CMS (content management system) software could pose a threat. This is exactly what happened with the latest Drupal threat. Drupal CMS…

Read More

Understanding Permission Aggregation and Insider Threats

Advanced access control on need to know basis.

Insider threats are a growing concern for any large corporation.  In 2016, 40% of successful breaches were due to outsiders, but 37% were due to insider threats. These numbers show that these types of attackers are just as popular as threats caused by employees, vendors or corporate contractors. Insider threats include anything from simple employee…

Read More