Welcome to Resource Center

Title

How-tos

  •  
     

    How to detect and respond to ransomware attacks

  •  
     

    How to detect files copied with DataSecurity Plus

  •  
     

    How to delete duplicate files

  •  
     

    How to track files copied to USB

  •  
     

    How to find and delete hidden files

  •  
     

    How to detect who last accessed a file

  •  
     

    How to detect who changed file permissions

  •  
     

    How to detect who deleted a file

  •  
     

    How to restrict copying files from server

  •  
     

    How to prevent data theft by employees

  •  
     

    How to find empty folders

  •  
     

    How to make USBs read-only

  •  
     

    How to prevent data leakage

  •  
     

    How to disable USB ports

  •  
     

    How to disable USB devices

  •  
     

    How to filter internet content

  •  
     

    How to prevent files from being copied

  •  
     

    How to find credit card numbers in files

  •  
     

    How to block employees from accessing websites

  •  
     

    How to monitor employee internet usage

  •  
     

    How to check effective permissions

 
Email Download Link
Back to Top