Blog

Data Security

Salesforce Security Guide: Best Practices

Renganathan Padmanabhan

Renganathan Padmanabhan

Data breaches exposed 36 billion records in the first half of 2020. This number continues to increase as more businesses go online, with more knowledge workers working remotely in 2021….

Google Workspace Data Protection Guide & Resources

Renganathan Padmanabhan

Renganathan Padmanabhan

Google Workspace, formerly known as G Suite, dominated the office productivity suite space in 2020, with a 59 percent US market share. Businesses worldwide continue to trust Google’s productivity and…

Texas Privacy Act: Overview and Compliance Guide

David Harrington

David Harrington

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is…

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…

How to Fix Broken Registry Items: Visual Guide and Solutions

Robert Grimmick

Robert Grimmick

Broken Registry Items can rarely cause a nonfunctional PC, but in many instances attempts to “clean” or optimize the registry will do more harm than good.

Last Week in Ransomware: Week of August 16th

Michael Raymond

Michael Raymond

This week was a win with REvil and SynACK decryption keys being released, but also saw a rise in PrintNightmare use by ransomware gangs.

Think Your Data Is Secure? Three Questions You Need To Answer Right Now

Yaki Faitelson

Yaki Faitelson

As organizations become more data driven, they also store more data in more places and access it in more ways — with phones, tablets and laptops. These ever-connected endpoints serve as gateways to large, centralized troves of sensitive information stored in your data center and in the cloud.

Understand and Implement Azure Monitor for Monitoring Workloads

Neeraj Kumar

Neeraj Kumar

You always want your business-critical production applications to run without issues or downtime. To achieve this you need to continuously analyze system logs, monitor your application and their dependent services…

Last Week in Ransomware: Week of August 9th

Michael Raymond

Michael Raymond

This week saw the rise of a new ransomware group called BlackMatter and demonstrated even ransomware groups should worry about disgruntled employees.

Packet Capture: What is it and What You Need to Know

Robert Grimmick

Robert Grimmick

Packet capture describes the act of capturing IP packets for troubleshooting, security review, or other purposes. It can also be misused for nefarious purposes.

How to Investigate NTLM Brute Force Attacks

Ed Lin

Ed Lin

This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.

Your Comprehensive Guide to Salesforce Shield

Renganathan Padmanabhan

Renganathan Padmanabhan

Salesforce Shield provides an excellent suite of tools for Salesforce data security. This guide explains why it might be the right choice for your enterprise security needs.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.