insider threat
Inside job: 6 ways employees pose an insider threat
CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …
Strong passwords don’t matter if employees don’t secure them
The line between personal and professional use of apps and devices continues to blur, and while employees claim to prioritize online security, data fro Ping Identity shows …
75% of companies experienced a fraud incident in the past year
Three quarters of companies (75%) have fallen victim to a fraud incident in the past year, a rise of 14 percentage points in just three years, according to Kroll.The findings …
Mobile users continue to put personal and corporate data at risk
Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …
Most employees are not malicious, but their carelessness can be just as damaging
The results of a new Loudhouse survey show a disconnect between employees and IT within an organization with 73 percent of U.S. employees believing their company provides …
Social experiment: 200 USB flash drives left in public locations
Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …
The average organization experiences 9 insider threats each month
After analyzing actual cloud usage across over 23 million employees, Skyhigh Networks uncovered how user behaviours put companies at risk and how catching and managing this …
Attackers posing as legitimate insiders still an enormous security risk
Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …
How to avoid data breaches? Start by addressing human error
Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …
Why background screening is vital for IT security
Which security controls are the most important in thwarting cyber crime against businesses? Anti-malware? Physical security? According to a recent survey, people are a main …
The insider versus the outsider: Who poses the biggest security risk?
Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders …
How to prevent insider threats in your organization
Time and again, organizations of all sizes and in all industries fall victim to insider threats: disgruntled, malicious insiders – employees, former employees, …
Featured news
Resources
Don't miss
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies
- Calico: Open-source solution for Kubernetes networking, security, and observability
- Cyber turbulence ahead as airlines strap in for a security crisis