Users can search for files/folders by Law Share’s heuristic engine uses rules to detect any suspicious activity. For example, if a ransomware was uploaded disguised as a Word document, Law Share cloud would detect the threat by checking the file content signature vs. its mime type. If Law Share detects that the file wasn’t really a Word document then Law Share stops the upload and sends an alert to the administrator.
Law Share supports granular permissions for folders that enable custom permissions. Using granular permissions, organizations can build permission tree to protect any sensitive data. Even if a folder is exposed to ransomware via Drive or Sync clients, the client apps cannot spread the infection to the folder with sensitive data.
Backing up and versioning of files can be effective mechanism to recover from a ransomware attack. In the event of a ransomware attack in a client computer, if the data had been versioned in Law Share server, then the client computer data can be restored using older versions from the server. Law Share offers unlimited versioning and endpoint backup to help companies develop effective anti-ransomware strategies.