When Does Unusual Data Activity Become Dangerous Data Activity?

When Does Unusual Data Activity Become Dangerous Data Activity?

Unusual data activity is the earliest warning sign of Insider Risk and potentially damaging data leak or data breach. Whether malicious or unintentional, unusual data access, unusual data traversing networks or apps where it generally doesn’t, etc., is often a precursor to employees doing something they shouldn’t — and data ... Read More
When Does Unusual Data Activity Become Dangerous Data Activity?

When Does Unusual Data Activity Become Dangerous Data Activity?

Unusual data activity is the earliest warning sign of Insider Risk and potentially damaging data leak or data breach. Whether malicious or unintentional, unusual data access, unusual data traversing networks or apps where it generally doesn’t, etc., is often a precursor to employees doing something they shouldn’t — and data ... Read More
Detecting and Responding to Unauthorized Access

Detecting and Responding to Unauthorized Access

| | Uncategorized
The simplest way to think about data security comes down to controlling access and unauthorized access. Either in the form of unauthorized data access or unauthorized access to a computer network, it is the archetype of data security risk. While it’s a simple idea, the challenge comes in defining what ... Read More
Detecting and Responding to Unauthorized Access

Detecting and Responding to Unauthorized Access

| | Uncategorized
The simplest way to think about data security comes down to controlling access and unauthorized access. Either in the form of unauthorized data access or unauthorized access to a computer network, it is the archetype of data security risk. While it’s a simple idea, the challenge comes in defining what ... Read More
Compromised Accounts Are Being Weaponized – Here’s How to Fight Back

Compromised Accounts Are Being Weaponized – Here’s How to Fight Back

Compromised user accounts have always been the most significant — and simplest — cybersecurity risk in the enterprise. Stolen credentials were the vector of choice for more than 40% of attacks in 2022, according to Verizon’s 2022 Data Breach Investigations Report. User credentials also comprise 63% of stolen data — ... Read More
Compromised Account Attacks Are Growing — Here’s What You Can Do

Compromised Account Attacks Are Growing — Here’s What You Can Do

Compromised user accounts have always been the most significant — and simplest — cybersecurity risk in the enterprise. Or, as Verizon put it in the 2021 Data Breach Investigations Report, “Credentials are the glazed donut of data types.” The 2021 DBIR showed that about half of all data breaches in ... Read More
Tips From the Trenches: Using Identity & Access Management to Increase Efficiencies & Reduce Risk

Tips From the Trenches: Using Identity & Access Management to Increase Efficiencies & Reduce Risk

As a security company, it’s imperative that we uphold high standards in every aspect of our security program. One of the most important and foundational of these areas is our Identity and Access Management (IAM) program. As part of Code42’s approach to this program, we have identified guiding principles that ... Read More
Tips From the Trenches: Using Identity & Access Management to Increase Efficiencies & Reduce Risk

Tips From the Trenches: Using Identity & Access Management to Increase Efficiencies & Reduce Risk

As a security company, it’s imperative that we uphold high standards in every aspect of our security program. One of the most important and foundational of these areas is our Identity and Access Management (IAM) program. As part of Code42’s approach to this program, we have identified guiding principles that ... Read More