Data Unit Blog

How Does Ransomware Work?

Access to information on your company's computer networks is essential for daily operation, and any downtime can be crippling to sales and productivity. Criminals know this, and they exploit this vulnerability with a type of malware known as ransomware.

While the inner workings of this attack may seem complicated, the goal is simple: lock you out of your own system until you pay. The first step to preventing this type of attack is knowing how it works. 


Topics: Security How to's ransomware

How to configure Kaspersky's System watcher

In this post we would like to give you a good idea what the system watcher from Kaspersky can do for you and how you can configure it yourself.  Sometimes you don't find the time to do it due to other tasks and responsabilities, don't hesitate to call our help desk at that moment. 

The first question is of course, why would we use or configure the system watcher feature.

Kaspersky System Watcher scans the most relevant system event data. The monitor tracks information about the creation and modification of files, the work of system services, any changes made to the system registry, system calls and data transfers over the network. System Watcher also processes information about operations with symbolic links containing references to files or directories, modifications of the master boot record where the loader for the installed operating system is stored and interception of OS reboots. Moreover, it analyses the contents of the packets transmitted via TCP, the main Internet transport layer protocol, in search of any evidence of criminal activity. The data collection process is automated and does not require user interaction.

  Don't have the time to read the hole article. Check out these demo videos:

Topics: How to's