Entries by TEMASOFT FileMonitor Team

Ransomware detection – Targeted vs. random attacks

When it comes to ransomware detection, targeted ransomware attacks are very difficult to identify through classic anti-virus technology. Although such attacks are less frequent than their random, mass, counterparts, they are far more devastating and expensive mainly because they have a higher chance of succeeding in encrypting the files. Let’s look at some important differences […]

Ranstop anti-ransomware stops WannaCryptor v2 – TEMASOFT Lab Demo

Case subject: WannaCryptor(WannaCry) v2 – (Virustotal details) Following up on the massive WannaCrypt attack, we have tested TEMASOFT Ranstop against several variants and recorded the test against the newest version- WannaCryptor v2. This version still spreads via email campaigns and combines the ransomware payload with worm spreading capabilities, but it uses a different command and […]

Data breach statistics for H1 of July 2016: Insider vs. ransomware

The first two weeks of July were rich in data breaches, especially in the healthcare sector. According to official reports in the US, a number of 17 breaches were reported, the large majority, affecting healthcare organizations, where all data breaches affected more than 500 individuals, hence, falling under the requirements of section 13402(e)(4) of the […]

Automatic ransomware detection available soon in TEMASOFT FileMonitor

Ransomware is already pandemic and there isn’t a cure yet. Why? Mainly because ransomware attacks are relatively easy to devise (can run in a valid application, even as a script) and the traditional anti-virus applications are bypassed completely as they look at different areas that can indicate or be subject of malware attacks. A good […]

How File Monitoring Can Detect Data Incidents as They Happen

Breaches are an extremely common occurrence for companies, especially if they are large businesses.  Even though not all data breaches are cyber-attacks, valuable data is exposed to outsiders or lost in all cases. An example of a data incident is an employee copying data to their personal device, violating the company policies. Sending documents by […]

How to solve the challenges of auditing access to data

Auditing access to data has been an important concern for companies that need to protect intellectual property and security-sensitive information. This concern became even more important during the last decade, with the increase in cybercrime, driving an array of regulations, security frameworks and associated standards that enforce this need, and establish penalties for lack of […]

Auditing complex file operations for compliance

Answering today’s compliance challenges through advanced file monitoring technology Data protection regulations and security standards are of paramount importance because losing security-sensitive data in an electronic environment is as dangerous, or even more dangerous, than losing an ID card or a credit card on a sidewalk. When data breaches occur, there are usually multiple records […]

Going beyond basic file auditing for data protection

Making the difference between read to output, and read to copy MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise security-sensitive data. However, detecting and investigating such incidents usually relies on object access logs or file monitoring solutions that only monitor basic file operations, such as read and write. […]