Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

When did you last change your work password? Was it when the system prompted you? When you were first hired? Or maybe the answer doesn’t matter. When it comes to password safety, old adages don’t always apply anymore. Let’s take a look at what today’s business password management really needs by focusing on the valuable […]

The post Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient appeared first on Security Intelligence.

Continue reading Beyond Password Safety: How to Make Employee Sign-On Safe and Convenient

Don’t Forget: A Checklist for Offboarding Remote Employees Securely

We all know about the threat of threat actors trying to access our corporate data.  But with the rise of remote work, keeping an eye on employees during offboarding is an important area to watch, as well. In many cases, employees can still access sensitive data well after they leave the job. This is even […]

The post Don’t Forget: A Checklist for Offboarding Remote Employees Securely appeared first on Security Intelligence.

Continue reading Don’t Forget: A Checklist for Offboarding Remote Employees Securely

Offboarding: A Checklist for Safely Closing an Employee’s Digital Doors

Three years after I left my former job, I got an official letter telling me the organization suffered a data breach. My personal information was at risk of identity theft. I shouldn’t have been surprised. That job’s offboarding process hadn’t been the best. For years after leaving, I had access to my email and to […]

The post Offboarding: A Checklist for Safely Closing an Employee’s Digital Doors appeared first on Security Intelligence.

Continue reading Offboarding: A Checklist for Safely Closing an Employee’s Digital Doors

Twitter: Epic Account Hack Caused by Mobile Spearphishing

Hackers “mislead certain employees” to gain access to internal tools to take over high-profile accounts and push out a Bitcoin scam. Continue reading Twitter: Epic Account Hack Caused by Mobile Spearphishing

Five Steps for Investigating and Responding to Employee Fraud

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.

The post Five Steps for Investigating and Responding to Employee Fraud appeared first on Security Intelligence.

Continue reading Five Steps for Investigating and Responding to Employee Fraud

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.

The post Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks appeared first on Security Intelligence.

Continue reading Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks

IP Theft: How Often Does Your IP Walk Out the Door?

Outgoing employees are motivated by revenge, greed and resentment to abscond with valuable data. A robust exit process is the key to preventing IP theft.

The post IP Theft: How Often Does Your IP Walk Out the Door? appeared first on Security Intelligence.

Continue reading IP Theft: How Often Does Your IP Walk Out the Door?