Data Breach Emergency Center

Experiencing a ransomware attack or a potential breach? You're in the right place!

Software tools

Expert instructions

Asset 9

Guides and resources

Preventative measures

Audit trails & evidence

Regulatory compliance

Experiencing a data breach or a potential data breach can be harrowing. We’ve gathered all the resources you need to guide you through the process of dealing with a breach – whether from a malicious outsider, a disgruntled insider or pure negligence. 

Remember, you’re not the first one to experience a breach. It will be ok in the end, there is a light at the end of the tunnel. Choose from the resources below, and add ITsMine’s Emergency Deployment as soon as possible to begin damage control.

Data Breach Resources

ITsMine's Complete Ransomware Guidebook

Including the first steps you need to take, from an expert in the field

Data Breach Regulatory Requirements by State

What you need to know in terms of specific U.S State requirements

Data Breach Regulatory Requirements: GDPR

What you need to know in terms of specific EU requirements

Take Back Control:
ITsMine Emergency Installation

Install to understand what happened

By installing ITsMine now, you can actually “go back in time” and assess what happened, understand current situation and formulate your response.

Obtain evidence

You’ll need a product likeITsMine for evidence and audit trail purposes

Limit the damage

You can choose to automatically deploy SoftwareMines™ in your file repositories to limit damage and protect data immediately.

Show that you are proactive

Your stakeholders will want to know what actions you’ve taken: now you can demonstrate you’ve taken the initiative, and protected against further incidents

See it in action

ITsMine Provides Breach Notification and more with SoftwareMines™

With SoftwareMines™ spread across the file server, suspicious behavior can be sensed immediately. When a SoftwareMine™ is set off – that is, exfiltrated and opened outside of the company’s environment – it will “call home” whenever and wherever it is used; thus providing an indication of a potentially significant data event. 

What attacker sees when accessing data outside of company boundaries
What the company SOC sees

Get the ITsMine’s SoftwareMines™ Now

The unique identifier that is carried by the exfiltrated SoftwareMine™ will allow the company to get vital forensic information regarding this data event, including: when the event happened, who was responsible, and what other resources this entity took or accessed.

ITsMine’s Virtual Vault Capabilities

ITsMine’s unique method for protecting and centralizing files everywhere is by enabling you to create Virtual Vaults across any Microsoft, Google, Dropbox, or NetApp cloud solutions. 

Files located in Virtual Vaults will automatically benefit from multiple layers of protection that will allow you to: 

  • Track the circulation and location of your critical files with File-GPS™. Files beyond company boundaries will “call home” in case of unauthorized access. 
  • Control your files. Kill critical files beyond company boundaries or subsequently set an access expiration date via TimeBomb™. 
  • Enforce access & functional permissions, anywhere. 
What End-User Sees
What the Company Administrator Sees

The ITsMine File-TimeBomb

For files from the Vitual Vaults. You can also choose to set expiration dates for data outside your Virtual Vaults, or immediatley kill it. Once the expiration date has been reached, the data outside of the company’s file server will be locked and become unusable, even beyond the company boundaries. The data itself, however, will remain valid and visible within the file server.  

FREE EBOOK DOWNLOAD

Encryption-less Ransomware: Best Practices for CISOs to Ensure Protection