Data theft by employee leads to federal indictment

Data theft by employee leads to federal indictment

Many businesses focus so much on protecting their data from outside threats that they give little thought to inside threats – namely their own staff.  For a manufacturer in Chicago, that turned out to be a very costly mistake! The company hired an engineer in...
What is proactive incident response?

What is proactive incident response?

Incident response as a term is reactive, so it’s no wonder that a proactive approach to incident response is a foreign concept to many clients and resellers that we work with.  Let’s look at a few common scenarios to understand why proactive incident...
Why you should frustrate your pen testers

Why you should frustrate your pen testers

The third or fourth step in any breach (depending on who you talk to) is that an attacker must ‘gain authority’. Think of it like a bank; if the criminal breaks into the vestibule they have little or nothing to steal, they have to get from the vestibule to the main...
Where are your data protection blindspots?

Where are your data protection blindspots?

Data security and privacy were named as top issues for 2019. Data loss prevention requires a comprehensive strategy to identify, protect and monitor sensitive information.  As most organizations do not 100% know what data they have stored (often over many years and...