-
Data Security
Aug 31, 2016
Malware Coding Lessons for IT People, Part II: Fun With FUD Ransomware!
This article is part of the series "Malware Coding Lessons for IT People". Check out the rest: Part I: Learning to Write Custom FUD (Fully Undetected) Malware Part II: Fun With FUD Ransomware!
Oded Awaskar
4 min read
-
Privacy & Compliance
Aug 23, 2016
HHS to Investigate Smaller HIPAA Privacy Breaches
As a reader of this blog, you know all about Health and Human Services’ (HHS) wall of shame. That’s where breaches involving protected health information (PHI) affecting 500 or more records are posted for the world to see. It’s actually a requirement of HIPAA – technically the HITECH Act. But now there’s been a slight change in breach policy.
Michael Buckbee
1 min read
-
Data Security
Aug 19, 2016
New SamSam Ransomware Exploiting Old JBoss Vulnerability
One of the lessons learned from the uptick in ransomware attacks is that it pays to keep your security patches up to date. A few months ago the SamSam/Samas malware was (and is still) having great success primarily against healthcare companies and hospitals.
Michael Buckbee
1 min read
-
Data Security
Aug 17, 2016
Six Authentication Experts You Should Follow
Our recent ebook shows what’s wrong with current password-based authentication technology.
Michael Buckbee
3 min read
-
Privacy & Compliance
Aug 03, 2016
What is the Minimum Acceptable Risk Standards for Exchanges (MAR-E)?
Under the Affordable Care Act (ACA) of 2010, there are now online marketplaces to buy health insurance. These are essentially websites that allow consumers to shop around for an insurance policy by comparing plans from different private providers.
Michael Buckbee
4 min read
-
Data Security
Aug 02, 2016
SQL Server Best Practices, Part I: Configuration
This article is part of the series "SQL Server Best Practices". Check out the rest: Part I: Configuration Part II: Virtualized Environments
Kieran Laffan
7 min read
-
Privacy & Compliance
Jul 27, 2016
Understanding Canada: Ontario’s New Medical Breach Notification Provision (and Other Canadian Data Privacy Facts)
Remember Canada’s profusion of data privacy laws?
Michael Buckbee
1 min read
-
Data Security
Jul 27, 2016
21 Free Tools Every SysAdmin Should Know
Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best general purpose sysadmin tools for troubleshooting, testing, communicating and fixing the systems that you need to keep running.
Rob Sobers
4 min read
-
Data Security
Jul 21, 2016
Banks Secretly and Silently Struggling with Ransomware
“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the most catastrophic events that a bank could suffer.”
Michael Buckbee
2 min read
-
Data Security
Jul 20, 2016
How to Identify Ransomware: Use Our New Identification Tool
Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations..
Michael Buckbee
1 min read
-
Data Security
Jul 19, 2016
How to Respond to a Cyber Security Incident
Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even if you’ve outsourced your IT or your data lives in the cloud, ultimately the responsibility for keeping your customer data safe falls on your shoulders.
Michael Buckbee
4 min read
-
Privacy & Compliance
Jul 19, 2016
Is Browsing Facebook While in the Hospital a HIPAA Violation?
A recently filed federal class-action suit claims that several healthcare providers are violating HIPAA’s rules on protected health information (PHI). If the suit succeeds, privacy advocates say it has the potential to disrupt the way the ad targeting industry deals with the healthcare sector.
Michael Buckbee
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital