Giving Away Your Passwords

You might have seen the headlines from the past couple of weeks detailing how some employers were demanding employees hand over their Facebook passwords or else. Privacy violation?  Just a little. Unfortunately, the House voted down an amendment that would prevent employers from making this ludicrous request.  After reading the rebuttal, I’m hopeful that this…

Fixing the Open Shares Problem

I recently spoke with an IT administrator who had started a manual open share cleanup project—finding and locking down folders and SharePoint sites open to global access groups like Everyone, Domain Users and Authenticated Users. After removing the everyone group from several folders, they began to receive help desk calls from people who had been…

10 Things IT Should Be Doing (But Isn’t): Free On-Demand Webinar

On our last webinar: 10 Things IT Should Be Doing (But Isn’t), we reviewed some of the challenges associated with unstructured data management and protection. IT requires the ability to answer critical questions about data in order to efficiently and effectively protect it. Some of these questions are: Who has access to data? Who has…

How to Accelerate Your Upgrade From Office 2003 with Office Migration Planning Manager (OMPM)

Yesterday I was speaking with an attendee at Data Connectors Boston who is involved in a project to upgrade his company’s workstations to Office 2010 from Office 2003. There are a few compatibility issues to be aware of when upgrading from one version to another—a big one is that some document macros will need to…

Forensic Investigation of Data Theft (Part 3)

In my last post, we determined that someone added a fictitious user account, “Allen Carey,” to Active Directory and this account was used to steal trade secrets from “Alpha Chemicals.” Fortunately, you had the foresight to install the DatAdvantage suite of products which will help recreate the activities performed by “Allen Carey” but more importantly,…

7 Recommendations for Data Protection by Forrester’s Andras Cser

Last week Varonis hosted a webinar on using strong identify context to help protect data, where I was joined by Andras Cser of Forrester. Andras shared really interesting insights on the impact of data breaches, what got stolen, how they happened, and what you can do to better protect yourself. On topic of entitlement reviews,…

Improve Data Protection, Win $500 Gift Card

Regulation in IT is nothing new, especially for those of us who’ve ever worked in the financial, government or health care sectors. What’s changing is the breadth of regulations–how much we actually need to do–and the types of information and systems these regulations apply to. No longer is it just the mainframes and other transactional…

Using Varonis: The Path Beyond Data Classification

(This one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) Data Classification is important because it helps us figure out where the most important data sits, but it should be a goal on its own. Just understanding what data…

Case Study: Matanuska Telephone Association

Matanuska Telephone Association (MTA) is a co-operative telecommunications service provider that offers its members local telephone services, high-speed Internet access, wireless phone service, digital television and managed business services. Like many organizations, there were occasions when MTA’s employees would inadvertently move, rename, or accidentally delete files. Finn Rye, MTA’s Information Security Officer, and his team…

In Data Security, You’re Only As Strong As Your Weakest Link

Reporter: “Why do you rob banks?” Willie Sutton (bank robber): “Because that’s where the money is.” That’s Sutton’s law.  It seems obvious, but it’s so very true.  The law also holds true for hackers– they will attack systems that  store valuable data. So where might that be?  My first guess would be the iron-clad data…