Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update #16 - O365 & Business Email Compromise

How can companies tell the difference between legitimate email activity from malicious activity if they suspect someone is inappropriately accessing a user’s email? Click to watch Kilian Englert and Ryan...
Kilian Englert
1 min read
Last updated October 22, 2021

How can companies tell the difference between legitimate email activity from malicious activity if they suspect someone is inappropriately accessing a user’s email?

Click to watch Kilian Englert and Ryan O’Boyle from the Incident Response team discuss how the IR team leverages built-in Varonis event enrichment to tackle this problem and help simplify investigations.

How do you plan to defend against ransomware infections like Emotet? Are you concerned your company may already be infected?

👋 Varonis can help. Please click here to contact us.

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

exchange-journaling-and-diagnostics:-how-to
Exchange Journaling and Diagnostics: How to
Journaling and Diagnostics Logging are services to monitor and audit activity on Microsoft Exchange servers. They provide basic auditing functionality for email activity (e.g. who sent which message to whom)...
last-week-in-ransomware:-week-of-july-19th
Last Week in Ransomware: Week of July 19th
This past week hasn't seen quite as much activity as others, likely due to the new ransomware task force created in the US and the mysterious disappearance of REvil and other gangs.
three-ways-varonis-helps-you-fight-insider-threats
Three Ways Varonis Helps You Fight Insider Threats
Insider threats are difficult for organizations to combat. Varonis’ modern cybersecurity answer uses the data security triad of sensitivity, access, and activity to combat threats.
increased-threat-activity-targeting-ivanti-vulnerabilities
Increased Threat Activity Targeting Ivanti Vulnerabilities
A recent surge in activity targeting Ivanti Connect Secure (ICS) involves chaining two vulnerabilities that give threat actors the ability to execute arbitrary commands remotely.