-
Data Security
May 02, 2016
Visualize your risk with the DatAlert dashboard
Last week, we introduced over 20 new threat models to help defend your data against insider threats, ransomware attacks and threats to your most sensitive data.
Michael Buckbee
1 min read
-
Data Security
Apr 29, 2016
Football player hacked live during NFL draft
Experts had Laremy Tunsil flagged as one of the top prospects in Thursday night’s NFL draft. But shortly before the opening pick, something disturbing happened. An incriminating video tweeted from Tunsil’s own verified Twitter account showed the Ole Miss star smoking a “marijuana-like substance” from a gas mask.
Rob Sobers
2 min read
-
Data Security
Apr 28, 2016
Cryptolocker, lockouts and mass deletes, oh my!
DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your data safe from insider threats.
Michael Buckbee
1 min read
-
Data Security
Apr 22, 2016
New Varonis eBook Helps IT Kickstart Their Pen Testing Program
Hackers are able to break into systems and move around easily without being detected. How is this possible with so much invested in firewalls, malware scanners, and other intrusion detection software? Answer: often times, no one has really taken the IT system out for a security test drive.
Michael Buckbee
1 min read
-
Data Security
Apr 15, 2016
CEO Phishing: Hackers Target High-Value Data
Humans like to click on links. Some of us are better at resisting the urge, some worse. In any case, you’d also expect that people in the higher reaches of an organization — upper-level executives and the C-suite — would be very good at resisting phish bait.
Michael Buckbee
2 min read
-
Data Security
Apr 14, 2016
Ransomware Guide for Healthcare Providers
Table of Contents Ransomware strains that have been targeting hospitals Should your hospital pay? Reasons not to pay Would a ransomware infection be considered a breach, according to HIPAA? Are there other potential HIPAA violations? Overview Healthcare providers have always been attractive targets for data breaches. Why? The value of a health record is high. According to Reuters, health records are 10 to 20 times more valuable than credit card numbers. Rather than stealing health records and trying to sell them on the black market, cybercriminals are using ransomware to turn a much quicker profit.
Michael Buckbee
4 min read
-
Data Security
Apr 13, 2016
Learning to Write Fully Undetected Malware - Lessons For IT
This article is part of the series "Malware Coding Lessons for IT People". Check out the rest: Part I: Learning to Write Custom FUD (Fully Undetected) Malware Part II: Fun With FUD Ransomware!
Oded Awaskar
7 min read
-
Data Security
Apr 01, 2016
PwC Report Shows That Cybercrime Is a Top C-Level Concern
One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies.
Michael Buckbee
3 min read
-
Ransomware
Mar 28, 2016
Samas, Cerber, Surprise: Three New Ransomware Variants to Have On Your Radar
As of late, the weekly press coverage of ransomware has been building a kind of brand recognition that’s the envy of many legitimate IT vendors. Ransomware’s own success has made it difficult to differentiate between the quickly evolving product variants — differences with how you get infected, what’s encrypted, ransom amount and special new features.
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2016
4 Step Guide to Managing Network Share Permissions
Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics of this have not dramatically changed since Windows Server 2003 and are relatively straightforward. However, after configuring the resource shares and the individual NTFS permissions for each folder, admins sometimes lose sight of the big picture as they handle daily permission requests on an ad-hoc basis.
David Gibson
6 min read
-
Data Security
Mar 17, 2016
There’s Something About Frameworks: A Look at HITRUST’s CSF
Repeat after me: frameworks are not standards. They are instead often used as a guide to navigate through the underlying standards.
Michael Buckbee
2 min read
-
Data Security
Mar 08, 2016
With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats
Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects Mac users.
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital