Beating Ransomware in 8 steps

Download this episode

Download Video

Description

Today, balloon tower defense-in-depth style, we cover the attack path for ransomware. Eight controls are detailed, each one with a varying degree of effectiveness, that can keep your organization from paying the ransom.

Tag:

Security

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image
      sunk818

      How about disabling Tor on the corporate network? Don't a lot of these ransomware use Tor to phone home?  

    • User profile image
      Ian2

      I would like to see large corporations (Microsoft, Google, Apple ...) get together (WOT!?) and fund a small dedicated "ransomware elimination force".

      One for the Directors board meeting methinks?

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.