Greenlight Blog

Another Day, Another Inside Threat Arrested

We’ve made the analogy before… you may be leaving the fox to guard the henhouse at your company. That’s because the inside threat continues to grow. The startling statistic from Ponemon points to 60% of all breaches being from an insider. And now Cisco is in the news...

It Took 9 Years to Catch This Inside Threat

Without the proper controls in place, you could be leaving the fox to guard the hen house. That’s what one NJ company just found out the hard way when its Financial Controller admitted to diverting $850,000 to her personal bank account over a 9 year period according...

Cooking the Books Instead of Pastries

It’s like you become a little kid again when you walk into a café and take a look at the wide assortment of pastries and cakes behind the display cases. Eyes widen… stomachs growl… thoughts of calories go out the window. The last thing going through your mind is the...

Time to Wake Up About the Inside Threat

Time to Wake Up About the Inside Threat The inside threat continues to grow at companies with various reports showing the insider is responsible for anywhere between 60% and 80% of breaches. Below are five stories about inside attacks that made the news in 2018:...

The Threats Within

by Jasmine Chennikara-Varghese Every organization struggles with managing and mitigating cyber threats both internal and external. Typically, more focus and resources are spent on fortifying perimeter security which provide sufficient protection to deter external...

A Black Eye Before Black Friday

Employee data continues to be a leading target for criminals and 60% of attacks are carried out by insiders. Despite this startling statistic, 61% of organizations don’t monitor privileged users more closely than regular users. And as retailers are gearing up this...

Your Health (Data) at Risk

by Jasmine Chennikara-Varghese The health care industry has been aggressively using their resources to implement and leverage enabling technologies for health management. As the healthcare sector technology evolves, it is encompassing clinics and doctor’s offices,...

Trust No One

by Jasmine Chennikara-Varghese More organizations are moving to the Zero Trust Security model as a way to overcome the challenges of typical perimeter security. As the boundaries of the corporate cyber landscape blur, securing the perimeter becomes more difficult. ...

Verizon DBIR 2018

by Jasmine Chennikara-Varghese The 2018 Verizon Data Breach Investigation Report (DBIR), which was recently released, reminds us that security is an ongoing challenge against evolving attack vectors and threats. It also acts as an advisory to continually monitor and...