crypto

How to Detect and Clean CryptoLocker Infections

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “holds them for ransom”, prompting any user that tries to open the file to pay a fee to decrypt them. For…

Remote Wipe: An essential feature of Enterprise File Sync and Share

Despite being lost to the annals of history, I am confident that shortly after the first executive used a Blackberry to check her email while on the go, an equally auspicious event occurred: an executive forgot her Blackberry on the table at the restaurant where they just ate lunch. This unfortunate, but inevitable event was…

FOIP

How Varonis Helps with Freedom of Information and Protection of Privacy Act (FOIP)

Detailed in the Freedom of Information and Protection of Privacy Act (FOIP), Alberta Canada public institutions (or public bodies) are required to legislate access to information in an effort to safeguard an individual’s personal information. To learn how Varonis solutions can help control how a public body make use and disclose personal information, read our…

liverpool-logo

Varonis DatAnywhere Lets the University of Liverpool Securely Share Sensitive Information

University of Liverpool is one of the UK’s leading higher education institutions, and a member of The Russell Group of research-intensive universities. It comprises three faculties organized into 35 departments and schools, and offers more than 230 first degree courses across 103 subjects. Currently the university has over 32,000 students and 4,700 staff. Across its…

DatAnswers

Varonis DatAnswers is GA

Our newest product, DatAnswers, was made generally available on December 15th. Now that the New Year’s change freeze is behind us, why not try it free for 30 days? Wait, what is DatAnswers? A secure, highly efficient, affordable enterprise search engine for file shares and SharePoint. Why would Varonis make a search engine? Not only…

Interview With NYU-Poly’s Professor Justin Cappos: Security Lessons From Retail Breaches

I had the chance to talk with cyber security expert Justin Cappos last month about the recent breaches in the retail sector. Cappos is an Assistant Professor of Computer Science at NYU Polytechnic School of Engineering. He’s well known for his work on Stork, a software installation utility for cloud environments. In our discussion, Professor…

Replace Enterprise Applications with DatAnywhere

When I was in elementary school, Ms. Brownfield taught us that one of the big things separating humans and animals was that humans were tool-users. Since that time, innumerable YouTube videos of crows using sticks to crack nuts have surfaced and taught us two things: What really distinguishes us from animals isn’t the use of…

A Sysadmins Guide to Thanksgiving

Are You Smarter Than a Hacker? [CONTEST]

They’ve broken into the largest retailers, key government agencies, and major social media companies, stealing tens of millions of credit card numbers, email addresses, and sensitive data. They’re experts at cracking codes, penetrating firewalls, and placing stealthy malware on our most guarded servers. Can the hackers be stopped? Maybe, but it helps if you can…

Getting Started with PowerShell Option Inputs

PowerShell is the dominant method of automating tasks and scripting changes for Windows sysadmins. This article covers getting started with some basic PowerShell usage and how to pass optional customization values into scripts. At the command prompt arguments ARGUMENTS Arguments refer to the options that are passed to a script that can then be acted…