How Does our Data get Compromised?

best-inside-out-security-show

Could it be that files are open to everyone? Or is because we have weak passwords? How about social engineering – one of the oldest trick in the book? Perhaps it is all of the above? Yesterday, in our fifth edition of our Inside Out Security Show, security experts David Gibson and Michael Buckbee joined […]

Continue Reading →

PwC Report Shows That Cybercrime Is a Top C-Level Concern

taxes-tax-evasion-police-handcuffs

One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of its 19th Global Economic Crime Survey. It revealed the kinds of numbers that get the attention of executives, and for public companies, their shareholders as […]

Continue Reading →

Real World File System Statistics [INFOGRAPHIC]

sky-space-dark-galaxy

We knew we had some interesting stats in our customer risk assessment results we released last week. But we were surprised in a nice way when it did, ahem, receive some attention in the media. After taking a deep breath, I took another look at the data and have some some additional comments to share. […]

Continue Reading →

Varonis Keeps Union Bank’s Data Safe from Insider Threats and External Attacks

union-bank-image

Today we’re excited to share another interesting customer success story out of the UK. Union Bank UK PLC needed better visibility into the different types of sensitive data its employees were storing and accessing across its file systems. Regulatory requirements necessitated that the bank’s IT department regularly audit and report on who was accessing sensitive […]

Continue Reading →

Samas, Cerber, Surprise: Three New Ransomware Variants to Have On Your Radar

ransomware-cerber-samas-surprise

As of late, the weekly press coverage of ransomware has been building a kind of brand recognition that’s the envy of many legitimate IT vendors. Ransomware’s own success has made it difficult to differentiate between the quickly evolving product variants — differences with how you get infected, what’s encrypted, ransom amount and special new features. […]

Continue Reading →

4 Step Guide to Managing Network Share Permissions

steps

Setting up network file sharing is one of those core IT practices that every Windows admin knows about and has implemented as part of their daily work. The basic mechanics of this have not dramatically changed since Windows Server 2003 and are relatively straightforward. However, after configuring the resource shares and the individual NTFS permissions […]

Continue Reading →

California Fine Tunes Its Breach Notification Law

sign-los-angeles-typography-usa

At an infosec conference I attended this week, a few speakers pointed out that hackers are very good at cooperating and sharing information. It’s not really news that as defenders we aren’t nearly as organized. Sure there are some good private efforts, such as the Financial Services Information Sharing and Analysis Center (FS-ISAC) and few […]

Continue Reading →

Numbersense in Data Security

numbersense-badge

Experts tell us that we won’t be able to maximize Big Data’s full potential unless we can extract meaningful insights from numbers. Just having a Big Data set of say, 12 different metrics on millions of customer, does not automatically lead to a business advantage. More is not necessarily better. One of these experts, Kaiser […]

Continue Reading →

Here’s Why Most Companies Are Easy Prey for Cyberattackers

SocialImage

Today we announced the results of anonymous data that our DatAdvantage and Data Classification Framework solutions collected throughout 2015 during risk assessments conducted for potential customers on a limited subset of their file systems. The results show a staggering level of exposure in corporate file systems, including an average of 9.9 million files per assessment […]

Continue Reading →

Should the Website that Infected a PC with Ransomware, Pay?

legos

In the past couple of months, we’ve been introduced to a rogue’s gallery of ransomware variants. Chimera threatened to publish files on the internet if the ransom remains unpaid. Ransom32 was our first ransomware written in Javascript and adds the innovation of Ransomware-as-a-Service. Locky, now purported to be affecting 90,000 systems per day, encrypts data […]

Continue Reading →