Employee monitoring software has emerged in recent years as faster tech collided with a desire for more flexible working arrangements. There are now dozens of companies offering software boasting a variety of tools to track the productivity of remote staff. It works like this: software is installed on the worker’s computer and the data is fed back to the boss.
The results found in this and subsequent sections within the report are based on a dataset collected from a variety of sources, including cases provided by the Verizon Threat Research Advisory Center (VTRAC) investigators, cases provided by our external collaborators and publicly disclosed security incidents. The year-to- year data will have new incident and breach sources as we continue to strive to locate and engage with additional organizations that are willing to share information to improve the diversity and coverage of real-world events.
A hacker reportedly used both bribery and social engineering to gain unauthorized access to a customer support system operated by the popular video game Roblox — illustrating why companies must be on the lookout for employees who fit the mold of an insider threat.
Laying off employees is always painful, but having to do so when they are completely remote adds a new wrinkle: What should employers do to protect the company’s data on laptops and other devices when letting remote workers go?
New decentralized, criminal marketplaces and “as-a-service” offerings make it easy for employees to monetize their knowledge and access to enterprise networks and systems.
Researchers shows most “flight-risk” employees planning to leave an organization tend to start stealing data two to eight weeks before they go. More than 80% of employees planning to leave an organization bring its data with them. These “flight-risk” individuals were involved in roughly 60% of insider threats analyzed in a new study. Researchers analyzed more than 300 confirmed incidents as part of the “2020 Securonix Insider Threat Report.” They found most insider threats involve exfiltration of sensitive data (62%), though others include privilege misuse (19%), data aggregation (9.5%), and infrastructure sabotage (5.1%). Employees planning an exit start to show so-called flight-risk behavior between two weeks and two months ahead of their last day, the researchers discovered.
Predicting insider threats can be an arduous process, but a new TransUnion (NYSE: TRU) insight guide points to the immediate need to thwart such transgressions. The guide, which was unveiled today at the 6th Annual Insider Threat Summit in Monterey, Calif., includes analysis from an anonymous, aggregated set of 165,000 U.S. Armed Services employees at the end of 2019. The analysis found that 23.2% of armed services employees run the risk of financial distress with 10.7% at the highest risk threshold.
The most valuable assets of many start-ups are their innovative, creative, and intellectual works and ideas. Often these can be protected by intellectual property rights (IPR). IPR encompass a range of rights including patents, copyright, trademarks, designs, database rights and various related rights. Some of these rights such as copyright and database rights arise automatically on creation and do not need to be registered. While others such as trademarks and patents require registration in order to be protected.
The financial industry has been forced to fast-forward telework arrangements for a wide and varied range of staff, from frontline employees who typically worked in the branch to top executives, who may need broad access to bank systems, data and files. For many financial institutions, who had up until recently allowed only a few select employees to work from home (or none at all), this sudden change has not only affected the logistics of their day-to-day banking business, but also how they handle information security across a distributed enterprise.
As millions of people work from home to reduce the possibility of becoming infected with (and spreading) the coronavirus, they inadvertently increase the risk of a cyberattack targeting their company’s IT network and systems. This threat is especially perilous since many C-level executives are now working in their home offices, sending and receiving confidential emails and texts via their smartphones and laptops. The problem? These work devices are connected over the internet to the same wireless system that also connects to their homes’ smart devices, which are particularly vulnerable to cyberattacks.
City of Spies – As the FBI continues hauling university scholars and researchers off in handcuffs for their work with the Chinese, academics all over Boston are asking: Am I next?
Charles Lieber had a brilliant mind. So it was widely assumed, at least among the rarified upper echelons of the scientific community, that there would come a day when the esteemed Harvard nanoscientist would receive an early-morning surprise from an unexpected caller—someone with a Norwegian accent telling him he had won a Nobel Prize. No one, though, could have imagined the jolt he received on campus one cold January morning this year, just the second day of the spring semester, when FBI agents stormed the brick building that houses the Department of Chemistry and Chemical Biology clutching an arrest warrant with his name printed on it.
Tech giants were the first to send their employees home as the coronavirus pandemic spread to the U.S. Now they’re among the last to bring them back to the office. Some of their employees might never go back. Facebook, Microsoft, Apple, Twitter are studying what their highly paid, highly valued employees want, using their own technology to make remote work easier and looking to hire new workers outside of big city hubs. It’s a potentially huge turnaround after years in which companies like Amazon and Google chased scarce tech talent by opening or expanding offices in hip urban locations such as San Francisco and New York.