Manage and Mitigate an Active Ransomware Attack

Manage and Mitigate an Active Ransomware Attack

Attackers are constantly developing new kinds of ransomware that use various attack vectors like malvertizing, ransomworm, and peer-to-peer file transfer programs. And now there is even Ransomware-as-a-Service, where hackers sell their malware to other cybercriminals,... Read more
Asystec’s accepted into the Varonis Elite Program

Asystec’s accepted into the Varonis Elite Program

In February of this year, Varonis launched the ‘Varonis Elite’ program. A Global initiative that brings cyber-security and Varonis enthusiasts together, to learn more from one another and engage with Varonis in new ways that were never possible before. Members are... Read more
Challenges with Unstructured Data

Challenges with Unstructured Data

With the exponential growth of data, unstructured data organizations are facing a big challenge to manage this growth and the underlying risks. These risks include how to protect their data, meet regulatory requirements while also extracting value from the data. Data... Read more
Asystec Awarded UK Varonis Vice Presidents Award

Asystec Awarded UK Varonis Vice Presidents Award

So its confirmed – Asystec have been awarded UK Varonis Vice Presidents Award! The Varonis Partners in Excellence awards which are in their inaugural year, recognizes the contributions and results demonstrated by partners in providing data-centric security solutions.... Read more
Asystec 1 of 9 Global Varonis Delivery Partners

Asystec 1 of 9 Global Varonis Delivery Partners

Asystec are delighted to be acknowledged as a Global Varonis Delivery Partner.  Congratulations to Peter O’Connor (Data Security & Governance Consultant) and Michael Spillane (Applications Specialist) who are now Varonis Certified Delivery personnel. ... Read more
Every Day is a School Day – DPA 2018 | Section 82

Every Day is a School Day – DPA 2018 | Section 82

It was the week before Christmas, when I was chatting about all things security while visiting an Asystec client. Being a Data Protection Officer (DPO) of many years standing and an expert in the subject matter himself, our conversation naturally turned to Data... Read more
Gain Control and Visibility of Your Web Interaction

Gain Control and Visibility of Your Web Interaction

Many cyber attacks these days are looking to assume control of user accounts, gain access to valuable information and exfiltrate this information to use for criminal activities.  Asystec works with vendors who look to give visibility during the various steps in the... Read more
Ransomware, breaches and new data regulation?

Ransomware, breaches and new data regulation?

Data lives in many places and many forms in today’s world, SaaS applications, file shares, databases, business applications, whether this data is on premise / off premise or in the cloud, each in their own silo – how can an organization cover off these requirements.... Read more