On-Demand Webinar

Responding to Ransomware: Steps to Take to Reduce Your Risk

UNIX, Linux, AIX
Recorded:
March 19, 2019

 

The act of ransom is a tale as old as time. However, the business of extortion can be conducted in a far more sophisticated manner than when Julius Caesar was held for ransom by pirates. Nowadays attackers can use ransomware to gain and withhold access to an organization’s data, threatening to either destroy or publicly publish it unless a ransom is paid.

To make matters worse, there is no guarantee the data will actually be returned. The results of these attacks are often devastating, and recovery can cost far more than the initial ransom when you factor in loss of productivity, damage to the reputation, lost business and more.

Watch this webinar with cybersecurity experts Bob Erdman, Security Product Manager at Helpsystems, and Holger Schulze, CEO and Founder of Cybersecurity Insiders, where they discuss the continuing challenge of ransomware. They explore motivations and perpetrators of attacks, who’s most at risk, and the most effective solutions to this pervasive problem to help you better understand ransomware and reduce the large threat it poses. Learn more about:

  • Entrance points for ransomware
  • Frequency of attacks
  • Detection of ransomware
  • Response to ransomware and remediation
Want to learn more about malware?

Find out what kinds of attacks organizations are experiencing and how they are handling these threats, from prevention to recovery in this comprehensive report from Cybersecurity Insiders, sponsored by HelpSystems.