Skip to content Skip to footer
Case Studies

Actual Insider and Cyber Risks reported

Discover how GuardWare INSIGHT strengthens risk management approach, ensuring data control, security, and compliance at every level for complete peace of mind.

Malicious Event

Personal USB vs Company USB​

When confronted by the IT team, the employee initially claimed to have returned the company USB, unaware that INSIGHT had logged his use of a personal USB as well.

Mass Download

SharePoint Malicious mass downloads from Sensitive Folder to user’s personal

INSIGHT flagged this suspicious activity, and an investigation confirmed that the data had indeed been transferred.

Human Error

SharePoint Exposure of Customer Data by Law firm

In response to this breach, the firm reconfigured INSIGHT to send high-priority alerts directly to both IT personnel and the individual users responsible for risky actions. 

Stored Passwords detected by INSIGHT by Company’s MSP having admin rights. ​

Scans revealed stored Customer data including bank account info in AWS DevOPs environment. ​

Outsource Developers of a financial institution detected exposing Financial APPs source code and company’s IP. ​

With INSIGHT, they can safely re-enable forum access, confident that any unauthorized source code postings will be promptly detected and addressed.​

Productivity Monitoring WFH compared with Office​

Rogue Network

Website Transfer

Dangers of using Cloud Storage Services and Website Transfers​

GuardWare INSIGHT monitors and prevent unauthorized file uploads across cloud, web, email, and chat applications, ensuring their data stays secure and compliant.​

Corporate Email Risk

Email forward to user’s Personal Email resulted in serious theft of sensitive PII data

GuardWare INSIGHT flagged the incident. The software’s AI detected the email forward to a personal account and scanned the attached file, identifying the sensitive content.

VPN Missuse

WFH Risks including VPN misuse ​

Investigation with GuardWare INSIGHT revealed that users were frequently turning the VPN on and off. The university adjusted the configuration to ensure the VPN remains active at all times.

Malicious Insider

Malicious Insider in a Recruitment Firm – Data exfil by a Director ​

Download Case Study

This will close in 0 seconds