Latest articles
DHS Emergency Directive 19-01: How to Detect DNS Attacks
Mar 29, 2020
On January 22, 2019, the United State Department of Homeland Security (DHS) released a warning for a DNS infrastructure hijacking attack against US government agencies. Let’s dig into the specifics...
4 Step Guide to Managing Network Share Permissions
Mar 25, 2016
Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics...
How to Detect and Clean CryptoLocker Infections
Feb 13, 2015
CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops...
PCI DSS Explained: Our New White Paper Decodes the Complexity
Feb 02, 2015
The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide...
Tips From the Pros: Best Practices for Managing Large Amounts of Shared Data
Dec 23, 2013
In our “Tips from the Pros” series, we’ll be the presenting interviews we’ve conducted with working IT professionals. These are the admins and managers responsible for security, access, and control...
Fixing the Open Shares Problem
Mar 29, 2012
I recently spoke with an IT administrator who had started a manual open share cleanup project—finding and locking down folders and SharePoint sites open to global access groups like Everyone,...
Open Shares
Nov 03, 2011
In my post last week, Share Permissions, I promised I’d write a follow up post on “open shares.” Open shares, in a nutshell, are folders that are accessible to all…
Share Permissions
Oct 25, 2011
In one of our recent posts, What About Individual Users on ACL’s? I mentioned that some organizations have opted for using Windows share permissions instead of NTFS permissions for file...
What About Individual Users on ACL's?
Aug 20, 2011
One question I received in response to our recent post about aligning windows security groups and automating entitlement reviews was, “If you’re using single-purpose security groups and managing them automatically...
Try Varonis free.
Deploys in minutes.