Blog

Data Security

How to Turn Cybersecurity Jargon into a Language Everyone in Your Office Can Speak

Rob Sobers

Rob Sobers

Cybersecurity jargon can be confusing, but it's imperative that every member of your organization — not just the IT department — understands what they mean. In this article, we explain how to translate 10 cybersecurity buzzwords for everyone in your office.

7 Wi-Fi Security Tips: Avoid Being Easy Prey for Hackers

Kody Kinzie

Kody Kinzie

While Wi-Fi offers the convenience of a seamless, untethered data connection, it comes with security disadvantages that hackers love to exploit. Without knowing the tricks hackers use to target Wi-Fi...

Security Risk Analysis Is Different From Risk Assessment

Michael Buckbee

Michael Buckbee

At the Inside Out Security blog, we’re always preaching the importance of risk assessments. IT and the C-levels need to evaluate vulnerabilities in their corporate systems to determine risk factors....

58% of organizations have more than 100,000 folders open to all employees

Rachel Hunt

Rachel Hunt

Like a wardrobe malfunction during a live broadcast, no one wants to be overexposed – especially when it comes to your data. The surprising truth: most companies go about their...

Analyzing Company Reputation After a Data Breach

Michael Buckbee

Michael Buckbee

Does a data breach affect how your customers see you? Take a look at what Americans think as we dive into the relationship between breaches and reputation.

What Would The World’s Data Look Like if it Were Physical?

Michael Buckbee

Michael Buckbee

Before we start to understand how to properly manage our data, we need to understand just how much there is to manage! Take a look at these analogies and visual aides to get a better idea of the size of our data.

Why A Honeypot Is Not A Comprehensive Security Solution

Michael Buckbee

Michael Buckbee

A core security principle and perhaps one of the most important lessons you’ll learn as a security pro is AHAT, “always have an audit trail”. Why? If you’re ever faced...

What is Metasploit? The Beginner's Guide

Michael Buckbee

Michael Buckbee

This Ruby-based open-source framework, Metasploit, allows testing via command line alterations or GUI. Learn more with our beginner's guide today.

COVID-19 Threat Update #2

Kilian Englert

Kilian Englert

The coronavirus crisis presents a perfect storm for attackers. Routines have been upended, employees are remote, and many will work on unpatched personal devices.  It only takes one compromised remote...

COVID-19 Threat Update #1

Kilian Englert

Kilian Englert

Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...

What is DLP?

What is Data Loss Prevention (DLP)?

Nolan Necoechea

Nolan Necoechea

Data Loss Prevention (DLP) solutions protect your data from theft, ransomware, and accidental deletion—learn how it works and how to pick the best solution.

What is Endpoint Security? A Complete Guide

Michael Buckbee

Michael Buckbee

Endpoint security is a growing concern for enterprises in every industry, given the value of digital assets and data, and must be a cybersecurity priority.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.