A bank had a long-term development contract with a company in India to develop a core banking application. The company was well-certified, including ISO 27001, and regularly trained its developers on cybersecurity risks and data handling. They also employed technologies to prevent data exfiltration, including blocking file uploads via browsers.
As part of their standard Cyber Security Assurance process, the bank used GuardWare ASSESSOR for a deep dive analysis of how the firm managed their source code and data. GuardWare ASSESSOR, with its unique ability to monitor source code, discovered that developers were accessing development forums—a common practice for troubleshooting.
However, to everyone’s alarm, it also detected that developers were posting source code from the core banking application on these forums, seeking help for specific issues.
The discovery was alarming. Although the firm promptly blocked all forum access, the damage was already done. Some of the exposed code was related to the live production application, raising serious security risks.
As a result, the bank had to engage a third-party secure code assessment firm to revalidate the application’s security and hire a specialist cybersecurity firm to monitor the application during its redevelopment to prevent any misuse of the exposed code.
To avoid future issues, the third-party firm now uses GuardWare INSIGHT to monitor developer activities. With INSIGHT, they can safely re-enable forum access, confident that any unauthorized source code postings will be promptly detected and addressed.
Get a Data Security Assessment
We Guarantee Results, through
our 3 week Risk Assessment
process.
If we don’t find any serious cyber risks or incidents, we’ll refund your investment.
When confronted by the IT team, the employee initially claimed to have returned the company USB, unaware that INSIGHT had logged his use of a personal USB as well.
SharePoint Malicious mass downloads from Sensitive Folder to user’s personal
device.
INSIGHT flagged this suspicious activity, and an investigation confirmed that the data had indeed been transferred.
SharePoint Exposure of Customer Data by Law firm – Human Error
In response to this breach, the firm reconfigured INSIGHT to send high-priority alerts directly to both IT personnel and the individual users responsible for risky actions.
Stored Passwords detected by INSIGHT by Company’s MSP having admin rights.
GuardWare INSIGHT’s data discovery scan detected the stored password file, prompting immediate deletion.
Scans revealed stored Customer data including bank account info in AWS DevOPs environment.
GuardWare ASSESSOR revealed stored customer data in log files on developers’ devices and in their AWS environment, as well as the unsafe sharing practices.
Outsource Developers of a financial institution detected exposing Financial APPs source code and company’s IP.
With INSIGHT, they can safely re-enable forum access, confident that any unauthorized source code postings will be promptly detected and addressed.
Productivity Monitoring WFH compared with Office
To address these concerns, the company deployed GuardWare INSIGHT’s productivity monitoring features to track work behaviors accurately.
Rogue Network
Security discovered that an employee had used system roll-back during this period, in an attempt to remove the GuardWare INSIGHT Agent from the system.
Dangers of using Cloud Storage Services and Website Transfers
GuardWare INSIGHT monitors and prevent unauthorized file uploads across cloud, web, email, and chat applications, ensuring their data stays secure and compliant.
Corporate Email Risk - Email forward to user’s Personal Email resulted in serious theft of sensitive PII data
GuardWare INSIGHT flagged the incident. The software’s AI detected the email forward to a personal account and scanned the attached file, identifying the sensitive content.
WFH Risks including VPN misuse
investigation with GuardWare INSIGHT revealed that users were frequently turning the VPN on and off. The university adjusted the configuration to ensure the VPN remains active at all times.
Malicious Insider in a Recruitment Firm – Data exfil by a Director
GuardWare INSIGHT showed that the data exfiltration occurred while the user was connected to the company’s Wi-Fi, proving the laptop was in his possession at the time.