5 Steps to Minimize Your Exposure to

5 Steps to Minimize Your Exposure to Ransomware Attacks

Ransomware attacks like the ones that wreaked havoc in the City of Baltimore, Maryland; at ASCO Industries; and the Weather Channel are dominating the headlines so far in 2019.

Holding someone or something for ransom is a simple yet effective strategy that has been used by criminals for thousands of years. Today, cyber criminals are successfully applying these ancient techniques to modern technologies.

According to the FBI’s Internet Crime Complaint Center (IC3) the damages associated with ransomware have dramatically increased over the last year. The City of Baltimore is a good example, as the damages are expected to exceed $18 million. This raises the question what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

Watch On-Demand to learn:

  • What is ransomware?
  • How do ransomware attacks work?
  • Ransomware trends and recent examples
  • Five steps to minimize your exposure to ransomware attacks

And by popular demand, we’ll cover how Zero Trust Privilege can not only minimize the impact of ransomware attack but also address the #1 cause of today’s data breaches – privileged access abuse.

Speaker

Dr. Torsten George

Dr. Torsten George
Cybersecurity Evangelist
Centrify

Dr. Torsten George is a cybersecurity evangelist at Centrify, which provides Zero Trust Privilege to secure modern enterprise attack surfaces. He is an internationally recognized security expert, author, and speaker. Dr. George has been part of the global IT security community for more than 20 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, IT security best practices, and other cybersecurity topics in media outlets.