How to Detect and Clean CryptoLocker Infections

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “holds them for ransom”, prompting any user that tries to open the file to pay a fee to decrypt them. For…

Continue Reading

Remote Wipe: An essential feature of Enterprise File Sync and Share

Despite being lost to the annals of history, I am confident that shortly after the first executive used a Blackberry to check her email while on the go, an equally auspicious event occurred: an executive forgot her Blackberry on the table at the restaurant where they just ate lunch. This unfortunate, but inevitable event was…

Continue Reading


How Varonis Helps with Freedom of Information and Protection of Privacy Act (FOIP)

Detailed in the Freedom of Information and Protection of Privacy Act (FOIP), Alberta Canada public institutions (or public bodies) are required to legislate access to information in an effort to safeguard an individual’s personal information. To learn how Varonis solutions can help control how a public body make use and disclose personal information, read our…

Continue Reading

Someone deleted my file. How can I find out who?

If you’ve ever been tasked with recovering a lost file or folder and had to explain exactly what happened (Who moved or deleted it? When did it happen? Why?), you know how annoyingly time-consuming it can be. And sometimes you simply don’t have any good answers. All you can do is restore from backup. How…

Continue Reading


Varonis DatAnywhere Lets the University of Liverpool Securely Share Sensitive Information

University of Liverpool is one of the UK’s leading higher education institutions, and a member of The Russell Group of research-intensive universities. It comprises three faculties organized into 35 departments and schools, and offers more than 230 first degree courses across 103 subjects. Currently the university has over 32,000 students and 4,700 staff. Across its…

Continue Reading

Inside the World of Insider Threats, Part IV: Conclusions

We’ve covered a lot of ground in this series of posts on insider threats. To quickly review, insiders who commit IT sabotage or theft of sensitive information are more technical employees with a predisposition to destructive behavior. However, there’s usually a trigger event associated with a job or career disappointment that puts them over the…

Continue Reading

Going Back To SQL Server 2008 In Order To Move Ahead

Last year, Microsoft ended its support for SQL 2008/R2. Customers with an enterprise agreement are still supported, but it’s a good idea to start planning your upgrade. Upgrading your production SQL Servers without a detailed plan of attack can be risky and result in a messy, time-consuming weekend (or two). The very first step is…

Continue Reading


Inside the World of Insider Threats, Part III: Means and Opportunity

If you’ve been reading along, you’ll know that the psychological motives for insiders are complex and worthy of a flowchart. In fact, in our last post we showed you a chain-of-event graph used by real security researchers. After insiders go to the dark side, they have one big advantage over outsiders: by default they are in…

Continue Reading

dodd frank

How Varonis Helps with the Dodd-Frank Wall Street Reform and Consumer Protection Act

The objective of the Dodd-Frank Wall Street Reform and Consumer Protection Act is to promote the financial stability of the United States by improving accountability and transparency in the financial system. Signed into federal law by President Barack Obama on July 21, 2010, this act contains regulation on its impact on IT Departments. To learn…

Continue Reading


PCI DSS Explained: Our New White Paper Decodes the Complexity

The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide reached over 100 billion—that’s lots of swipes and 16-digit numbers entered! With its almost 300 controls, PCI DSS provides the rules of the road for…

Continue Reading