home_banner

Content Icon

Take a Clear-Eyed Approach to Ransomware

July 24, 2018 | Ask-An-Expert Writeups | Malware and Advanced Threats | By Jake Williams, IANS Faculty

As ransomware incidents become increasingly common, most organizations realize they need to better tailor their incident response strategies. In this Ask-an-Expert live interaction, IANS Faculty Jake Williams offers tips on buying cryptocurrency, engaging a middleman for negotiations, setting up an optimal backup strategy and countering the "CSI Effect."
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Ransomware Preparation and Response Checklist (Updated)

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

For Best Anti-DDoS Results in AWS, Use AWS Shield Advanced

Distributed denial-of-service (DDoS) attacks are a major concern for all organizations. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends Amazon Web Services (AWS) users invest in AWS Shield Advanced to get the most protection.

Exec Comms Briefing: Apple Zero-Day Flaws Target Default iOS Mail App

Newly discovered flaws in all versions of Apple's iOS allow attackers to gain full access to email within iOS' built-in Mail app. In this briefing, IANS Faculty Jake Williams explains how the flaws are exploited and offers recommendations for protecting iOS devices while we wait for Apple to roll out a patch.

DNS Filtering and Blocking Tools: An Overview

DNS filtering and blocking tools work well, but they should be considered more of an add-on vs. a primary security control. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains their pros and cons, and provides an overview of top vendors in the space.