3 Steps to Combat Ransomware in K-12 and Public Sector

3 Steps to Combat Ransomware in K-12 and Public Sector
The recent cyber attack on Los Angeles Unified School District is not unique. Public schools and universities are targets for ransomware, that can cripple your infrastructure and expose sensitive data.

Not having proper security is a risk you can’t afford. But with tight budgets and limited personnel, finding the right security can be an uphill battle.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Cloud security best practices for multi-cloud: Beyond native tools

As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive protection from bad actors.
Watch Now

Building Blocks for Your IT Security Program

AT&T Cybersecurity

Implementing effective asset discovery and vulnerability assessment are two of the most important first steps in improving IT security. Before you can protect your environment, you need to understand what assets you have across your cloud and on-premises environments, and be able to identify and prioritize vulnerabilities.
Watch Now

Breach Detection: Why SPOTTING a Breach is More Important than STOPPING it

activereach

In the current threat landscape, most businesses now recognise that it is only a matter of time before they are breached. This shift in philosophy from the idea of preventing every intrusion to realising that intrusions will happen is an important milestone. Sadly, hackers can hide in your network for days, weeks or months without your knowledge. UK businesses, especially SMBs, need to get smarter in their approach to detecting intrusions and limiting their impact.
Watch Now

Cryptocurrency Fraud and Blockchain Forensic Analysis

Bank information security

When a total of $580 Million left two Cryptocurrency exchanges after a sophisticated compromise, LIFARS team was engaged in an investigation that involved FBI, US Secret Service, Europol, DHS, IRS and DOJ. This session will take you exclusively inside that investigation and discuss: Cryptocurrency fraud schemes, including real stories from the trenches; AML issues with bankers, hidden assets, payments by drug lords and ransomware; Blockchains role in tracking the transactions - and its limits.
Watch Now