Blog

Trust and Betrayal – A Tale of Insider Threats
Data breach Data security Insider threat Privacy

Insider threats can cause more damage than external hackersYou do complete background checks and go through references as part of your hiring processes. You continually and painstakingly train employees on security and data breach topics to make sure they are educated and will know what to do and not to do during the course of daily business.

You even conduct daily auditing of system activity and ensure that you are consistent with discipline at your workplace.  On top of it all, you’ve even gotten cyber insurance. You’ve made reasonable efforts to protect your sensitive business files as well as data and your business.  And, you trust your staff, so you naturally feel pretty confident that you are covered on all sides.

You Can Stop Authorized User Data Breaches
Data breach Data security Insider threat Privacy

Stop Data Breaches by Authorized UsersWith news of data breaches every other day, many companies are now turning their attention to where sensitive files reside, who has access to the sensitive information, how this information is being used and securing it.

The cyber criminals’ techniques for breaking through perimeter defenses are always getting more sophisticated. Everyone realizes that network security alone is no longer a sufficient solution as the perimeter that once held sensitive information safe has been eroded.  Now everyone must adapt to a perimeter-less world.

Protect Against R&D Data Theft
Data breach Data security Insider threat Mobile security Print security

Protect Against R&D Data TheftRecently I was in a meeting with a global pharmaceutical client in New Jersey who told me of the importance they place on their highly secure, centrally managed and monitored persistent security platform to protect against data theft and ensure that their valuable R&D information cannot be lost or inadvertently sent to a competitor.

As the meeting ended, I was informed of the news about the charges brought against five people in the Untied States around trade secret theft inside another global pharmaceutical company. Allegedly a senior level manager at the company was involved in this theft.

Given the global state of business competition, there is a special appeal to the cyber thugs with high-priced or high-demand items. There is an alarming interest in stealing intellectual property, trade secrets and exactly how these items are produced.