Beating Ransomware in 8 steps

Sign in to queue

Description

Today, balloon tower defense-in-depth style, we cover the attack path for ransomware. Eight controls are detailed, each one with a varying degree of effectiveness, that can keep your organization from paying the ransom.

Tag:

Security

Embed

Download

Download this episode

The Discussion

  • User profile image
    sunk818

    How about disabling Tor on the corporate network? Don't a lot of these ransomware use Tor to phone home?  

  • User profile image
    Ian2

    I would like to see large corporations (Microsoft, Google, Apple ...) get together (WOT!?) and fund a small dedicated "ransomware elimination force".

    One for the Directors board meeting methinks?

Add Your 2 Cents