Qostodian Prime: How to Quarantine and Restore Files with Sensitive Information
Share
Qostodian Product video banner

In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizations need robust security measures to safeguard their data. This is where Qostodian Prime comes in. In this instructional video, we will guide you through the process of using Qostodian Prime’s quarantine and restore feature.

The first step is to identify the files that contain sensitive information. This can include financial documents, personal information, or any other data that you want to protect from unauthorized access. Once you have identified these files, you can easily quarantine them using Qostodian Prime.

Quarantine and Restore

To quarantine a file, simply right-click on it and select the “Quarantine” option from the drop-down menu. Once quarantined, the file will be replaced with a tombstone on your desktop. This tombstone acts as a notification that the file has been quarantined and is temporarily unavailable.

Now, let’s say you need to access the quarantined file again. Qostodian Prime makes it simple to restore the files to their original location. To do this, right-click on the tombstone and select the “Restore” option from the menu. The original file will be instantly restored to your desktop, ready for you to access and use.

The quarantine and restore feature in Qostodian Prime provides an added layer of security for files containing sensitive information. By temporarily removing these files from the desktop and replacing them with tombstones, you can ensure that they are safe from prying eyes.

It’s worth mentioning that Qostodian Prime’s quarantine and restore feature is not a permanent deletion tool. The files are not permanently removed but rather temporarily hidden from view. This means that the files can be easily restored whenever you need them.

In conclusion, Qostodian Prime offers a comprehensive solution for the protection of sensitive information. With its easy-to-use quarantine and restore feature, users can quickly and effectively safeguard their files. By quarantining files with sensitive information, you can ensure that they are kept away from potential threats. And with the ability to restore these files whenever you need them, you have complete control over your data.

A propos de l'auteur

A propos de l'auteur

Recommended for you

crypto malware vs ransomware
Blog
While often used these two terms interchangeably, malware vs. ransomware each represent distinct threats to our digital security. Malw...
what is the purpose of a privacy impact assessment
Blog
A Privacy Impact Assessment (PIA) is a vital tool in modern data management, designed to help organizations identify and mitigate potenti...
brute force attack
Blog
The basic principle behind a brute force attack is straightforward: keep trying different combinations until you find the right one. T...
fully undetectable
Blog
Cyber attackers will continue to refine their techniques, making the potential impact of a successful fully undetectable malware (FUD) ev...
data loss prevention policy sample
Blog
Aside from data loss being a headache, costing money, causing legal trouble and hurting your company’s reputation, data loss can also res...
data visualization best practices (2)
Blog
Transforming raw data into visually appealing and easily digestible formats can greatly help organizations empower their stakeholders to ...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​