ContentsThe aikux webinar on Monday:
|
||
Dear Customer, He goes to critical factors like that Age of dates and Emerge redundant data one. When completely parallel file structures arise in this context, the "point of no return" has often already been reached: Data volume is growing
getting farther and faster and
the efficiency of the user sinks constantly.
If you are looking for valuable expert knowledge in practice, you should not miss this know-how webinar! Participation is free, register here:
Clean up NTFS permissions with migRaven: Migrate file servers and clean up automatically: More webinars & registration The next webinar appointment:
With kind regards,
News from aikux.comNo authorization for Locky & Co.: 2 ways to limit ransomware risks1. Basis: set rights correctly. Locky can only encrypt wherever he gets! As a specialist in the security and efficiency of corporate data and rights structures, we experience time and again in many projects how important an efficient Access Rights Management (ARM) is in everyday situations. Against the background of new types of blackmail malware (ransomware), the assignment of rights is even more important. In case of doubt, the damage can already occur restrictive rights assignment
be significantly reduced, because Locky can encrypt only where the user of the corrupted computer has rights. "First line of defense against blackmail Trojans like Locky are" loud
heise.de
2. Optimal: Whitelist also prevents unknown dangers However, if you want to completely slow down this new type of malware, you cannot avoid using special software, because conventional firewalls and antivirus programs are regularly unable to stop them. With Application Control from our partner Lumension® we can offer you an effective tool that monitors the execution of software on the basis of flexible whitelist-based guidelines and does not even allow the execution of such encryption programs. With this application, IT administrators also manage to monitor all applications running in the company environment in the shortest possible time and to ensure the consistent implementation of software guidelines. Access Rights Management (ARM) with 8MAN Enterprise Lumension® Application Control
We've moved!Our new rooms are only about 2 km away from the previous location in Oldenburger Straße. The telephone numbers have remained the same, please use our new address for correspondence:
More from aikux.comThe aikux video portal
|
||
aikux.com GmbH |
||
To unsubscribe please use the following link: |
||