home_banner

Content Icon

5 Steps to Ransomware Detection, Prevention and Response

February 12, 2020 | Webinar Replays | Malware and Advanced Threats | By John Strand, IANS Faculty

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. In this webinar, IANS Faculty John Strand walks through a step-by-step checklist of the process.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Ransomware Preparation and Response Checklist (Updated)

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

For Best Anti-DDoS Results in AWS, Use AWS Shield Advanced

Distributed denial-of-service (DDoS) attacks are a major concern for all organizations. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends Amazon Web Services (AWS) users invest in AWS Shield Advanced to get the most protection.

Exec Comms Briefing: Apple Zero-Day Flaws Target Default iOS Mail App

Newly discovered flaws in all versions of Apple's iOS allow attackers to gain full access to email within iOS' built-in Mail app. In this briefing, IANS Faculty Jake Williams explains how the flaws are exploited and offers recommendations for protecting iOS devices while we wait for Apple to roll out a patch.

DNS Filtering and Blocking Tools: An Overview

DNS filtering and blocking tools work well, but they should be considered more of an add-on vs. a primary security control. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains their pros and cons, and provides an overview of top vendors in the space.