Data Security
Lessons from the Twitch Data Leak
Oct 07, 2021
What happened? Increasingly covered by the mainstream press throughout Wednesday, October 6, 2021, the impact of the recent Twitch leak will undoubtedly grow as bad actors take advantage of the...
PeStudio Overview: Setup, Tutorial and Tips
Oct 06, 2021
An overview of the free malware analysis tool PeStudio.
Microsoft LAPS Overview: Setup, Installation, and Security
Sep 28, 2021
Learn the basics of Microsoft LAPS to keep users from gaining unauthorized access to your system. Contact us for help with your data protection needs.
Varonis extends security capabilities to Nutanix Files
Sep 24, 2021
The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis…
The Ultimate Guide to Procmon: Everything You Need to Know
Sep 21, 2021
Knowledge is power when it comes to maintaining a proactive cybersecurity posture. Knowing what’s going on within your systems and monitoring networks for potential issues, hacks, or malware is critical…
Salesforce Security Guide: Best Practices
Sep 21, 2021
Data breaches exposed 36 billion records in the first half of 2020. This number continues to increase as more businesses go online, with more knowledge workers working remotely in 2021….
Google Workspace Data Protection Guide & Resources
Sep 16, 2021
Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and…
Texas Privacy Act: Overview and Compliance Guide
Sep 15, 2021
Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is…
The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees
Sep 14, 2021
Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…
How to Fix Broken Registry Items: Visual Guide and Solutions
Aug 18, 2021
Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.
Last Week in Ransomware: Week of August 16th
Aug 16, 2021
This week was a win with REvil and SynACK decryption keys being released, but also saw a rise in PrintNightmare use by ransomware gangs.
Think Your Data Is Secure? Three Questions You Need To Answer Right Now
Aug 11, 2021
As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.
Try Varonis free.
Deploys in minutes.