A survey reveals ex-employees are still using passwords. We comment on concrete measures such as MFA, access reviews, and verification testing, which can help prevent past employees from silently retaining or regaining access to company systems.
Read MoreWe comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.
Read MorePolymorphic malware is challenging data security experts and law enforcement. What is it and why does it pose a threat?
Read MoreClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.
Read MoreA former employee is convicted of embezzlement, including filing fake reimbursement requests. We comment on recurrent clues in receipts, behavior, and spending patterns that suggest an employee may be submitting fake requests.
Read MoreA survey claims that younger employees want "meaningful work" more than they do pay. Do you agree with that? You make the call and join the conversation.
Read MoreWe comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.
Read MoreA survey reveals that internal fraud damages organizations from within. We comment on how combining tone at the top, clear consequences, duty segregation, and reporting channels reduces the likelihood and duration of internal schemes.
Read MoreJack examines the issue of employees having side hustles. We want to know what you think.
Read More