Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
30 January, 2019 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
30 September, 2016 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
30 August, 2016 | Ryan Brooks

11 Steps to Insider Threat Mitigation

Have you ever considered that your employees could be putting your organization’s most valuable information assets at risk? This article details key best practices for mitigating insider threats through extended visibility into data activity, systems and users — and offers a solution that can...
23 March, 2016 | Jeff Melnick

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to...
Show more articles