CERT

, , Comments Off on A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus to Snowden: a study of insider threat personas‘ highlights how employees in two of the world’s … Continued

, , , Comments Off on Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication), Oxford e-Research Centre & the US Secret Service. In a series of 3 posts we … Continued

, , , , Comments Off on Password Security Policy: Managing the threat of shared passwords in enterprises.

Password Security Policy: Managing the threat of shared passwords in enterprises.

Password Security Policy: Managing the threat of shared passwords in enterprises.

The effectiveness of any password security policy depends on users not sharing passwords. Popular circumstances where users believe their actions are justified include; delegating work to others and vacation coverage. Here we look at the danger of shared passwords and how to stop the threat through UserLock’s multi-factor authentication and contextual access controls. An IT Security … Continued

, , Comments Off on Network Security Insider Threat. How UserLock can help organizations implement CERT best practices

Network Security Insider Threat. How UserLock can help organizations implement CERT best practices

Network Security Insider Threat. How UserLock can help organizations implement CERT best practices

  Network Security Insider Threats are influenced by a combination of technical, behavioral and organizational issues. Addressing the threats involves a layered defense strategy consisting of policies, procedures and technologies. UserLock is one such unique technology solution that helps organizations implement many CERT best practices to mitigate insider threats. The Common Sense Guide to Mitigating Insider … Continued

Secured By miniOrange