Marko Saric, researcher, has recently found out that 58% of savvy audience block collection of data obtained by resources during web surfing. He processed the most popular posts on Reddit and Hacker News through Google Analytics and Plausible Analytics trackers. It appeared that more than half of users read those…


The company decided to exempt a number of employees from groups which have access to internal message boards.

In order to prevent further data leakage, Facebook decided on limiting the access to internal message boards. Groups tied to the platform security will be made private.


Today it’s more difficult to trick technology than a person. Social engineers have sufficient experience deceiving people, even leading specialists and heads of departments. How to stay as aware as possible?

Imagine, you receive an email — 40 seconds will be enough to check it:

Look at the sender’s address…


A sophisticated network of digital interconnections causes the unavoidable growth of multi-party data breaches.

According to the research released by Cyentia Institute and RiskRecon and based on the analysis of 897 multi-party data breach incidents which have happened since 2008.

The most awful multi-party data breach brings 26 times bigger…


According to the recent report made by Varonis, manufacturers risk losing too much data if they don’t manage their internal access rights properly. The manufacturing sector might want to review the standards regarding security policies and establish some new rules regarding access to confidential files within

a corporate perimeter.

The…


77% people in Russia believe that they are being monitored by their devices. 47% think that intelligence and security service is what they need to mind while using gadgets, 39% are afraid of scammers. Meanwhile 20,1% of respondents are sure that there is a total monitoring process going on, i.e…


SearchInform announced an update of the SearchInform FileAuditor DCAP system. Now the system allows you to specify the level of document confidentiality right in the interface of Microsoft Office applications. …


How efficient are DLP systems with preset configurations? Can a system be configured once and for good? Why does a system see violations where there are none? Here we’ll tell you how to teach your DLP discover security threats with minimum errors.

DLP monitors all user actions at their workstations, and that is loads of data. The system should be guided via configured information security policies in order to recognise an incident in such a data flow. …


Several information security incidents which have happened recently are all based on utter carefreeness. A former employee in Nijmegen, Netherlands, leaked the data belonging to Radboudumc (The Radboud University Medical Center) about a month ago. …


According to the OAIC (the Office of the Australian Information Commissioner), ransomware-related data breaches rose by 24%. As Australian Information Commissioner and Privacy Commissioner claims, assessing the number of breaches and their quality is not easy when it comes to ransomware. …

Alex Parfentiev

Leading Analyst at https://searchinform.com/, I’m here to address those human factor risks many businesses often neglect or aren’t even aware of

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store