Data Unit Blog

How Does Ransomware Work?


Access to information on your company's computer networks is essential for daily operation, and any downtime can be crippling to sales and productivity. Criminals know this, and they exploit this vulnerability with a type of malware known as ransomware.

While the inner workings of this attack may seem complicated, the goal is simple: lock you out of your own system until you pay. The first step to preventing this type of attack is knowing how it works. 

 

Topics: Security How to's ransomware

The relationship between TOR and ransomware

During your travels around the World Wide Web (or if you’re a House of Cards fan), you may have heard the TOR (The Onion Router) network of servers mentioned. This network was initially developed by the U.S. Navy as a way to anonymously browse the Internet. When used in that manner, the TOR network is a great concept and a lifeline for some users. However, for others, TOR is an enigmatic network with suspected links to hackers and other illegal activities.

Topics: Security ransomware

Is Ransomware a Virus?

What's the true nature of the so-called ransomware virus? Is ransomware really a virus?

 

Topics: Security ransomware

What is Ransomware?

Ransomware is one of the most serious security threats of 2016, and it shows no sign of going away soon. Ransomware is a type of malware that applies powerful encryption to files on a target network, then demands a payment to restore access to the files.

Topics: Security ransomware

Data Unit named as the EMEA Storage Specialist of the Year 2016


We are proud to yet again receive an EMEA Award, this time for our expertise in storage products & services.

We herewith would like to share this fantastic news with you first. You can find the official press release in this post. We would like to thank everyone who helped us to achieve this.

Topics: Corporate news

10 Questions Answered About Ransomware

In Q4 of 2015, Hewlett-Packard released research showing cybercrime costs U.S. firms an average of $15 million each year – double the global average. That figure is an increase of 19%, and digital criminal activity is only expected to grow. With the “Internet of Things” on the horizon, millions of new IP-enabled devices will soon be online, each one representing a potential target.

One of the most insidious developments in cybercrime over the last 18 months is the global emergence of a potent new kind of malware: Ransomware. These powerful Trojans leave both consumers and businesses at their mercy, locking access to critical files and then extorting large cash payments to restore them.

Whether you have a team of five or a global enterprise of 50,000, it’s crucial to be aware of this emerging threat. Let’s look at some of the most common questions and their answers:

Topics: Security ransomware

How to configure Kaspersky's System watcher

In this post we would like to give you a good idea what the system watcher from Kaspersky can do for you and how you can configure it yourself.  Sometimes you don't find the time to do it due to other tasks and responsabilities, don't hesitate to call our help desk at that moment. 

The first question is of course, why would we use or configure the system watcher feature.

Kaspersky System Watcher scans the most relevant system event data. The monitor tracks information about the creation and modification of files, the work of system services, any changes made to the system registry, system calls and data transfers over the network. System Watcher also processes information about operations with symbolic links containing references to files or directories, modifications of the master boot record where the loader for the installed operating system is stored and interception of OS reboots. Moreover, it analyses the contents of the packets transmitted via TCP, the main Internet transport layer protocol, in search of any evidence of criminal activity. The data collection process is automated and does not require user interaction.


  Don't have the time to read the hole article. Check out these demo videos:

Topics: How to's

Data Unit and Barracuda Networks, a successful partnership!

Data Unit is an IT service provider, focusing on innovative, reliable network infrastructure and security solutions resulting in improved productivity for businesses. Most organizations upgrade their technology every couple years. At Data Unit, we do it every day for companies and institutions ranging from start-ups to large multinational corporations in a wide variety of verticals. That’s why we have chosen to work with the American specialist Barracuda Networks.

Though our customers may face different challenges, their purpose in working with us remains the same, they need an IT infrastructure capable of supporting their business activities and goals, and they need it to work efficient and reliable now and over the long term. Providing this end-to-end level of service is where Data Unit shines.

Since 2015, Data unit is the only premier partner, which is the highest achievable partnership level of Barracuda Networks.

Topics: Corporate news Product news and updates

Barracuda Networks launched NextGen Firewall S-series


  • Barracuda expanded its NextGen Firewall product family with the new Barracuda NextGen Firewall S-Series, which is designed to empower customers to securely connect thousands of machine endpoints, enabling new ‘Internet of Things’ applications and deployments.
  • The Barracuda NextGen Firewall S-Series provides customers powerful functionality and an easy and affordable way to centrally manage highly distributed and hybrid networks, especially those with a large number of remote devices or kiosks such as ATM machines or remote offices.
  • The Barracuda NextGen Firewall S-Series helps customers enforce proper access privileges, secure and centrally manage all communications, and quickly roll out thousands of devices to untrained staff in remote locations. The Barracuda NextGen Firewall Secure Connector 1 (SC1) appliance includes firewalling, Wi-Fi, and full VPN connectivity.
  • The Barracuda NextGen Secure Access Concentrator (SAC) is a virtual gateway – able to run in both Microsoft Azure environments and private clouds – to optimize traffic flow and centrally apply next-generation firewall functionality to deployed Barracuda NextGen Firewall SC1 appliances.
Topics: Security Product news and updates

Barracuda launched the new Barracuda NG F18, Barracuda NG F80 and Barracuda NG F180

Yesterday, Barracuda Networks announced the Barracuda NG Firewall F18, Barracuda NG Firewall F80, and Barracuda NG Firewall F180. These new models come with more than 1Gb firewall throughput and are capable of running the full NextGen feature set including SSL interception, WAN optimisation, etc. but also Advanced Threat Detection even in small branch offices and thus, make internet breakouts secure.

Topics: Security Product news and updates