5 Steps to Minimize Your Exposure to Ransomware Attacks

Minimize Ransomware

Watch Webinar

Ransomware attacks like the ones that wreaked havoc in the City of Baltimore, Maryland; at ASCO Industries; and the Weather Channel are dominating the headlines so far in 2019.

Holding someone or something for ransom is a simple yet effective strategy that has been used by criminals for thousands of years. Today, cyber criminals are successfully applying these ancient techniques to modern technologies.

According to the FBI’s Internet Crime Complaint Center (IC3) the damages associated with ransomware have dramatically increased over the last year. The City of Baltimore is a good example, as the damages are expected to exceed $18 million. This raises the question what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

Watch On-Demand to learn:

  • What is ransomware?
  • How do ransomware attacks work?
  • Ransomware trends and recent examples
  • Five steps to minimize your exposure to ransomware attacks

And by popular demand, we’ll cover how Zero Trust Privilege can not only minimize the impact of ransomware attack but also address the #1 cause of today’s data breaches – privileged access abuse.


Torsten George

Torsten George, Cybersecurity Evangelist, Centrify

Torsten is an internationally recognized IT security expert, author, and speaker. Torsten has been part of the global IT security community for more than 25 years and regularly provides commentary and publishes articles on data breaches, insider threats, cyber warfare, incident response, and IT security best practices, as well as other cyber security topics in media outlets.

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us