Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Egnyte

Don't Let Malware Hold You Ransom

Ransomware is a relatively new form of malware that poses significant threats to computer networks, even those with effective security systems. It masquerades as legitimate software and uses encryption protocols, like those designed to protect personal information, to lock down files and hold data for ransom. In addition to the increased frequency of attacks, hackers are continuing to grow more sophisticated, targeting high profile businesses that can afford to pay higher ransoms.

10 Ways to Keep Your Devices and Data Secure Online

Here are my top recommendations for people who want to increase the safety of their devices and data online. Please note “increase safety,” isn’t equivalent to “ensure 100% security,” because although 100% security doesn’t exist, we should still strive for it. It’s important to remember that maintaining security requires us to continually apply and update best practices to an ever-evolving digital landscape.

Find it Your Way

We’re focused on empowering our end users to locate the content they need, fast. Businesses leverage Egnyte because we fit so seamlessly into day-to-day operations. File access, security management, and permissions control are as important to us as they are to the organizations we serve. We strive to ensure our users can find any file in just three clicks (or taps for mobile) and this blog highlights some of the ways in which we make this possible.

Ax: Query Logs with Confidence

Modern log aggregation stacks including ELK (Elasticsearch, Logstash, and Kibana), Google’s Stackdriver, or AWS Cloudwatch are great tools, but their browser-based interfaces are not for everybody. At Egnyte, we rely heavily on logs to monitor our systems and solve customer issues. Therefore, many of our engineers depend on Kibana, the ELK browser-based query tool.