Business Insider Reports on How FireEye Is Addressing Insider Threat
Business Insider recently spoke to Jon Ford, managing director of FireEye’s Mandiant Professional Services, on the state of insider threat and their newest Insider Threat Security-as-a-Service offering. The launch of this service has allowed innerActiv to work as a part of the FireEye/Manidiant team to investigate and remediate threats for existing and new customers. Many...
US Navy Couple Charged in Identity Theft – The First Link in the Chain
As Identity Theft Awareness Week continues, we need to consider the source and root of identity theft incidents. Those who perpetrate identity theft schemes are often second (or third)-hand users of the identity data. The chain begins with either the organization that leaks the data or the criminal that illegally removes the data from its...
Identity Theft Doubles in 2020
We are officially halfway through Identity Theft Awareness week which runs Feb. 1-5 this year. Are you aware that Identity Theft incidents doubled in 2020? One of the largest surges in these thefts came in the form of false unemployment claims, taking advantage of the huge number of unemployed Americans over the course of the...
2021 is Here – Do You Need Help With Your Insider Threat Program?
As we quickly move toward the 4th week of 2021, it may become obvious which resolutions are actually going to see the light of day. While many organizations have made plans for formalizing (or maybe just thinking about) their insider threat program in 2021, most have difficulties deciding where to start. Many more have difficulty...
There’s No Excuse to “Not Know”
“Tesla does not know whether the defendant took additional files, whether he copied files from the Dropbox account to other locations in the days before he was caught, or whether he sent any of the files to other persons or entities,” the company says. Only 3 days after he started at the company, Alex Khatilov...
Announcing Mandiant Insider Threat Security Services
We’re proud to announce that innerActiv has partnered with FireEye and Mandiant to become a part of Mandiant’s Insider Threat Security Services! These services will provide industry-leading insider risk assessment services to identify active risks and threats, security gaps, and vulnerabilities in your environment, followed by tailored recommendations and action items to address both your...
APT, Insider Threat, and UEBA – Where’s the Overlap?
For those who work in security, it may seem that threats to your data, endpoints, and infrastructure can come from every angle. Unfortunately, many of these threats either originate from or implant themselves within the walls of the organization itself. The term “insider threat” and “UEBA” have evolved to describe this laundry list of potential...
Announcing A Joint Solution from FireEye and innerActiv
We are pleased to announce that we have developed a joint insider threat solution with our friends and industry experts, FireEye! This solution will provide innerActiv and FireEye customers an unbeatable set of metrics to protect their data, their employees, and their organization as a whole. Please view the full press release here. and stay...
Is My Employer “Spying” on Me?
Never in our years of business have we had an organization come to us and say, “I want to be able to spy on my employees.” Why? Because employers and IT teams are concerned about the well-being of the organization itself, not the personal lives of its users. As a matter of fact, we’ve found...
New To Work From Home? Here’s Some Tips.
For some of us, working from home is nothing new. However, many are now experiencing it for the first time due to the coronavirus. Working from home has a lot of advantages, depending on your career. In the technology industry, we find it’s becoming more and more common. With the latest push to work from...
Controlling Cyber Threat Risks in the Days of COVID-19
Unprecedented …. Uncertain ….. Indeterminate Although these phrases seem over-used by news outlets these days, they are all, unfortunately true. We are living and working with many unknowns. The one “known” that has followed us is that of cyber threat. During the past month, cyber-attacks of all varieties have only increased as they prey on…
When Data and Employees Go Home
So, your laptops are dispersed, remote access is up and running, phone lines redirected… time to see how this “work from home thing” goes! These are all important steps, but how will you know that your information is safe when users are literally walking out the door with it? Are you even positive what data...