Building Visibility into Hybrid Workplaces: Tips for Minimizing Employee Burnout

It’s become a bit of a cliché, saying that the pandemic created a “new normal” for all of us. But the reality is, the pandemic did introduce new ways of living and working. Employees are demanding more flexible workplaces with a stronger focus on work-life balance than before the pandemic, ... Read More

The Great Resignation: 3 Steps to Help CISOs Secure Critical Data During Offboarding

| | Dtex, insider threat
With 4.4 million workers quitting their jobs in April 2022, the Great Resignation persists. In response to the continued trend of workers leaving their jobs, business leaders and HR teams are grappling with how to retain top talent, while CISOs and IT teams work through the challenges associated with securely ... Read More

Employee Stress & Insider Threats: How to Mitigate Risk from a Security & HR Standpoint

April is Stress Awareness Month. It’s been recognized as such since 1992, but given the events of the past few years, it’s critical to spread awareness now more than ever—and not only during the month of April. Stress impacts people in various ways and it elicits different responses from individuals ... Read More
When the Hackers are Insiders—the Super Malicious Threat

When the Hackers are Insiders—the Super Malicious Threat

When organizations think of insider threats, the focus is often on disgruntled or malicious employees or partners misusing data. This could include downloading sensitive data to USB drives, sending it to personal email accounts, or uploading it to cloud drives. Each of these actions is something well within the technical ... Read More

10 Tips to Strengthen Your Insider Threat Program – Privacy, Policy, Performance [Part 2]

| | insider threat
Read this blog post by Lynsey Wolf for 5 more tips on strengthening your Insider Threat Program to prevent data exfiltration. The post 10 Tips to Strengthen Your Insider Threat Program – Privacy, Policy, Performance [Part 2] appeared first on Dtex Systems Inc ... Read More
Insider Threat Kill Chain

10 Tips to Strengthen Your Insider Threat Program – Data, Intent and Context [Part 1]

| | insider threat
When building an insider threat program, the same 10 building blocks hold true for everyone. Read this blog post to learn how to strengthen your InT program and prevent data exfiltration. The post 10 Tips to Strengthen Your Insider Threat Program – Data, Intent and Context [Part 1] appeared first ... Read More