pos attack

Point-of-Sale Cyber Attacks Are Back With Backoff

Point-of-Sale attacks are back in the news. But they never really left us. In the wake of the Target attack, the FBI issued a bulletin in January warning about future incidents. They identified the malware type (RAM scrapers) and the infection vector (phish mails, and compromised websites or “watering holes”). And they even pointed out…

3721789588_878be272e4_z

3 Deadly File Permissions Mistakes

Scarily, in most organizations people have access to much more information than they need in order to do their jobs.  With file permissions, it’s easy to mess things up and hard to find and fix problems, especially in large environments.  One tiny mistake can cause a ripple effect across terabytes of data, opening up a…

Automate Exchange Distribution List Management

From a business perspective, distribution lists (DLs) for email communications are a powerful and well-understood concept in IT. And they are popular: Exchange admins have voted with their right-clicks, creating lots of these Active Directory objects in their corporate domains. DLs speed up overall collaboration and leverage the power of groups to answer questions, share…

At-Risk Exchange Data

One of the more interesting benefits of  last year’s launch of DatAdvantage for Exchange was the opportunities it presented to talk with different sets of people in our customers’ organizations. Where traditionally we’d worked mostly with security, storage, Windows or Active Directory teams, DatAdvantage for Exchange spurred meetings with messaging, e-Discovery and legal folks as…

Fixing the Open Shares Problem

I recently spoke with an IT administrator who had started a manual open share cleanup project—finding and locking down folders and SharePoint sites open to global access groups like Everyone, Domain Users and Authenticated Users. After removing the everyone group from several folders, they began to receive help desk calls from people who had been…

10 Things IT Should Be Doing (But Isn’t): Free On-Demand Webinar

On our last webinar: 10 Things IT Should Be Doing (But Isn’t), we reviewed some of the challenges associated with unstructured data management and protection. IT requires the ability to answer critical questions about data in order to efficiently and effectively protect it. Some of these questions are: Who has access to data? Who has…

Big Data Management On Your NAS Made Easy

Got data? Got a lot of it? Most companies with NAS devices are struggling with how to manage permissions and understand usage patterns, find data owners, and identify and lock down sensitive information. If any of that sounds familiar, we’ve got the webinar for you. As part of our new partnership with HP, Varonis is…

How to Share Your Mailbox or Calendar in Outlook: It’s Easy

It’s so easy, in fact, that just about everyone figures it out the first time. Most end users have realized by now that right-clicking on something in Windows does magical things, and it’s not a long leap from there to select properties and permissions when you want to grant access to something. (If you really…

Varonis Webinar: Eliminating Data Security Threats

On last week’s North American webinar, Eliminating Data Security Threats, Brian Vecci talked about how unstructured data presents some unique challenges to IT organizations, when it comes to identifying who has access, who is accessing and who should have access to Windows, NAS and UNIX folders, SharePoint sites and Exchange mailboxes and public folders. And how…

The Light Is Better Over Here

An analyst reminded me of a joke the other day where a man is looking for his lost keys under a street-light. A passerby asks the man if he is sure about where he dropped them, and the man replies, “I’m actually pretty sure I dropped them in the grass over there.” “Then why aren’t you…