6 Steps to Prepare for a Cyber Attack

6 Steps to Prepare for a Cyber Attack

Many companies have an incident response plan that may look great on paper but they have not tested the execution. Key stakeholders must agree on the strategy, evolve it over time and be able to implement it confidently during an incident.

Best Practices to Avoid Insider Threat

Best Practices to Avoid Insider Threat

Best Practices to Avoid Insider Threat
All companies must use the best practices to avoid insider threat from taking place and know how to avoid situations involving accidental or a malicious rogue employee or contractor. According to Verizon’s 2015 Data Breach Investigations Report, 50% of all security events are caused by a company's own employees.

Insider Threats and IT Security: How to Identify and Prevent

Insider Threats and IT Security: How to Identify and Prevent

The number of insider threats from employees causing IT security breaches has skyrocketed since 2007. Globally, over 4.2 billion records were compromised in 2016, and according to Verizon’s 2015 Data Breach Investigations Report, 50% of all security events were caused by employees from inside the organization where they work.