Blog

Data Security

SQL Server Best Practices, Part I: Configuration

Kieran Laffan

Kieran Laffan

Am I the only one who finds the Microsoft SQL server best practice guides to be a little painful to trawl through? Somehow, I doubt it. After being frustrated reading...

21 Free Tools Every SysAdmin Should Know

Rob Sobers

Rob Sobers

Knowing the right tool to the right job is something that can save you hours of extra work and tedium. We’ve compiled a list of of some of the best...

Banks Secretly and Silently Struggling with Ransomware

Michael Buckbee

Michael Buckbee

“You’re almost certainly not going to hear about successful ransomware attacks on banks,” says Fraud Prevention Expert, Ross Hogan in an interview with Banking Exchange. “It is probably one of the...

How to Identify Ransomware: Use Our New Identification Tool

Michael Buckbee

Michael Buckbee

Sadly, ransomware infections are routine enough that IT departments have started to develop standardized procedures for rapidly quarantining infected machines, determining the extent of damage and then attempting recovery operations.. For...

How to Respond to a Cyber Security Incident

Michael Buckbee

Michael Buckbee

Every day another company is caught off guard by a data breach. While avoiding an attack is ideal, it’s not always possible. There’s no such thing as perfect security. Even...

Layered Security - IOSS 14

Michael Buckbee

Michael Buckbee

Layered security refers to the practice of combining various security defenses to protect the entire system against threats. The idea is that if one layer fails, there are other functioning...

The Essential Guide to Identifying Your Organization’s Most Sensitive Content

Michael Buckbee

Michael Buckbee

What do hackers want? If you answered money — always a safe bet — then you’d be right. According to the Verizon Data Breach Investigations Report (DBIR), financial gain still is...

What is The Cyber Kill Chain and How to Use it Effectively

Michael Buckbee

Michael Buckbee

The cyber kill chain maps the stages of a cyberattack from the early reconnaissance stages to data exfiltration. The cyber kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).

Password Security Tips for Very Busy People

Michael Buckbee

Michael Buckbee

If you needed another reminder that you shouldn’t use the same password on multiple online sites, yesterday’s news about the hacking of Mark Zuckerberg’s Twitter and Pinterest accounts is your...

How has Ransomware Impacted the US Government?

Michael Buckbee

Michael Buckbee

Ransomware crimes have been soaring this year. It has stalled the operations of not only hospitals and businesses, but also the US government – federal, state and local governments, law enforcement...

Ransomware That Deletes Your Files

Michael Buckbee

Michael Buckbee

Organizations with legal obligations to prevent data from improper alteration or destruction—I’m talking to you healthcare orgs that fall under HIPAA– really need to pay close attention to a new...

CyptMix Ransomware Claims to Donate Your Ransom Payment to Charity

Michael Buckbee

Michael Buckbee

Unlike traditional ransomware notes that rely on fear-based tactics, a new ransomware strain called CyptMix preys on your generosity. Part of the ransom note reads: “Your money will be spent...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.