LevelBlue Blog
Tag: File Integrity Monitoring
What is File Integrity Monitoring? Tools, open source, best practices explained
March 6, 2020 | Jim Hansen
We hear a lot in the news today about how important it is to make sure that critical files have not been tampered with – whether its malware, hackers, or employees/contractors - if we can be alerted the moment critical system files and sensitive data files have experienced unauthorized changes, then we’ve gone a long way in… Read more →
AWS File Integrity Monitoring (FIM) explained
February 13, 2020 | LevelBlue Labs
Today, 76% of organizations have adopted or are planning to adopt cloud services, including cloud storage. Amazon Web Services (AWS) is the public cloud market leader with 40% cloud market share. Its Simple Storage Service (Amazon S3) is one of its most popular services, used by nearly 195,000 unique domains. S3 data integrity and file integrity monitoring - what you need to… Read more →
What is File Integrity Monitoring and Why You Need It
February 27, 2019 | Sacha Dawes
The news is rife with stories of successful attacks against servers, point-of-sale (POS) systems, IoT devices and more where an attacker has gained access to an organization’s IT assets and changed or inserted new files and data to do something malicious. Just a search on malware highlights a seemingly-endless list of variants including the recent exposure of NSA-backed… Read more →
File Integrity Monitoring Solutions – What Are They and Why You Need One, Part 3
May 31, 2017 | Sacha Dawes
With the recent WannaCry ransomware attack still top of mind for many IT professionals worldwide, it’s an important reminder to that you should monitor not just your networks and security devices, but also data on your servers and desktops. In the case of WannaCry, having File Integrity Monitoring (FIM) in place can enable you to detect… Read more →
File Integrity Monitoring - Because Bad Guys are Sneaky
April 22, 2014 | Lauren Barraco
Sadly, perpetrators of malicious changes in IT don't just announce themselves. While on the surface, File Integrity Monitoring (FIM) doesn't appear all that sexy to security practitioners, it is a great way to deal with sneaky bad guys. It's forensic in nature - providing the ability to look at changes after-the-fact to figure out what happened. The… Read more →