Entries by TEMASOFT FileMonitor Team

Ransomware detection – Targeted vs. random attacks

When it comes to ransomware detection, targeted ransomware attacks are very difficult to identify through classic anti-virus technology. Although such attacks are less frequent than their random, mass, counterparts, they are far more devastating and expensive mainly because they have a higher chance of succeeding in encrypting the files. Read about some important differences between […]

Ranstop anti-ransomware stops WannaCryptor v2 – TEMASOFT Lab Demo

Case subject: WannaCryptor(WannaCry) v2 – (Virustotal details) Following up on the massive WannaCrypt attack, we have tested TEMASOFT Ranstop against several variants and recorded the test against the newest version- WannaCryptor v2. This version still spreads via email campaigns and combines the ransomware payload with worm spreading capabilities, but it uses a different command and […]

Data breach statistics for H1 of July 2016: Insider vs. ransomware

The first two weeks of July were rich in data breaches, especially in the healthcare sector. According to official reports in the US, a number of 17 breaches were reported, the large majority, affecting healthcare organizations, where all data breaches affected more than 500 individuals, hence, falling under the requirements of section 13402(e)(4) of the […]

How to solve the challenges of auditing access to data

Auditing access to data has been an important concern for companies that need to protect intellectual property and security-sensitive information. This concern became even more important during the last decade, with the increase in cybercrime, driving an array of regulations, security frameworks and associated standards that enforce this need, and establish penalties for lack of […]

Auditing complex file operations for compliance

Answering today’s compliance challenges through advanced file monitoring technology Data protection regulations and security standards are of paramount importance because losing security-sensitive data in an electronic environment is as dangerous, or even more dangerous, than losing an ID card or a credit card on a sidewalk. When data breaches occur, there are usually multiple records […]