Latest articles
What is UPnP and why is it Dangerous?
Jun 26, 2017
Learn what UPnP (Universal Plug and Play) is and about its potential dangers. Contact us today for all of your cybersecurity needs.
I Click Therefore I Exist: Disturbing Research On Phishing
Jun 20, 2017
Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until...
GDPR: Troy Hunt Explains it All in Video Course
Jun 14, 2017
You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day...
[Infographic] From Bad Report Cards to Insider Data Theft
Jun 12, 2017
We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long...
Disabling PowerShell and Other Malware Nuisances, Part III
Jun 08, 2017
One of the advantages of AppLocker over Software Restriction Policies is that it can selectively enable PowerShell for Active Directory groups. I showed how this can be done in the...
Data Breach Definition by State
Jun 06, 2017
State governments are becoming more aware of PII and PHI data breaches, how about your state? See how PII is protected per state with our primer on US State Data Breach Law Definitions.
Disabling PowerShell and Other Malware Nuisances, Part II
Jun 02, 2017
Whitelisting apps is nobody’s idea of fun. You need to start with a blank slate, and then carefully add back apps you know to be essential and non-threatening. That’s the...
Disabling PowerShell and Other Malware Nuisances, Part I
May 26, 2017
Back in more innocent times, circa 2015, we began to hear about hackers going malware-free and “living off the land.” They used whatever garden-variety IT tools were lying around on...
Is a ransomware attack a data breach?
May 22, 2017
Understanding if ransomware is a data breach is vital to determining what response your IT and Legal department needs to take.
How to use PowerShell for WannaCry / WannaCrypt cleanup and prevention
May 16, 2017
Use PowerShell to help test and resolve issues from WannaCry / WannaCrypt variants and other ransomware attacks.
🚨 Massive Ransomware Outbreak: What You Need To Know
May 12, 2017
Remember those NSA exploits that got leaked a few months back? A new variant of ransomware using those exploits is spreading quickly across the world – affecting everyone from the...
Planet Ransomware
May 12, 2017
If you were expecting a quiet Friday in terms of cyberattacks, this ain’t it. There are reports of a massive ransomware attack affecting computers on a global scale: in the...
Try Varonis free.
Deploys in minutes.