Beating Ransomware in 8 steps

Download this episode

Download Video


Today, balloon tower defense-in-depth style, we cover the attack path for ransomware. Eight controls are detailed, each one with a varying degree of effectiveness, that can keep your organization from paying the ransom.





Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image

      How about disabling Tor on the corporate network? Don't a lot of these ransomware use Tor to phone home?  

    • User profile image

      I would like to see large corporations (Microsoft, Google, Apple ...) get together (WOT!?) and fund a small dedicated "ransomware elimination force".

      One for the Directors board meeting methinks?

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.