COVID-19 THREAT UPDATE #4

Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...
1 min read
Last updated January 17, 2023

Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand.

Click to watch Matt Radolec and Ryan O’Boyle from our Incident Response team discuss how they’re seeing a big jump in the number of ransomware investigations and attacks in this new video:

Video Thumbnail
1:39

 

If you’d like help understanding what you’re seeing or not seeing, please click here to contact us.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

how-cybercriminals-buy-access:-logins,-cookies,-and-backdoors
How Cybercriminals Buy Access: Logins, Cookies, and Backdoors
Explore how cybercriminals buy VPN credentials, infostealer logs, breach databases, and web shells to access networks without writing a single exploit.
data-classification-in-the-age-of-llms:-a-technical-deep-dive
Data Classification in the Age of LLMs: A Technical Deep Dive
Discover how to combine LLM-based classification with deterministic methods to maximize accuracy, speed, and data sovereignty.
data-discovery-is-not-data-security
Data Discovery Is Not Data Security
Cloud‑native data security demands go beyond basic discovery. Learn why DSPMs fall short and how continuous activity monitoring and remediation reduce real risk.
varonis-saas:-fast-&-easy-agentless-cloud-deployment
Varonis SaaS: Fast & Easy Agentless Cloud Deployment
Varonis’ cloud-native Data Security Platform deploys in minutes and delivers immediate protection at scale.