Data Unit Blog

10 Questions Answered About Ransomware

In Q4 of 2015, Hewlett-Packard released research showing cybercrime costs U.S. firms an average of $15 million each year – double the global average. That figure is an increase of 19%, and digital criminal activity is only expected to grow. With the “Internet of Things” on the horizon, millions of new IP-enabled devices will soon be online, each one representing a potential target.

One of the most insidious developments in cybercrime over the last 18 months is the global emergence of a potent new kind of malware: Ransomware. These powerful Trojans leave both consumers and businesses at their mercy, locking access to critical files and then extorting large cash payments to restore them.

Whether you have a team of five or a global enterprise of 50,000, it’s crucial to be aware of this emerging threat. Let’s look at some of the most common questions and their answers:

Topics: Security ransomware

How to configure Kaspersky's System watcher

In this post we would like to give you a good idea what the system watcher from Kaspersky can do for you and how you can configure it yourself.  Sometimes you don't find the time to do it due to other tasks and responsabilities, don't hesitate to call our help desk at that moment. 

The first question is of course, why would we use or configure the system watcher feature.

Kaspersky System Watcher scans the most relevant system event data. The monitor tracks information about the creation and modification of files, the work of system services, any changes made to the system registry, system calls and data transfers over the network. System Watcher also processes information about operations with symbolic links containing references to files or directories, modifications of the master boot record where the loader for the installed operating system is stored and interception of OS reboots. Moreover, it analyses the contents of the packets transmitted via TCP, the main Internet transport layer protocol, in search of any evidence of criminal activity. The data collection process is automated and does not require user interaction.


  Don't have the time to read the hole article. Check out these demo videos:

Topics: How to's