The Impact of Ransomware & How to Defend Against It

Trend Micro

Ransomware attacks have been an ongoing concern since they first emerged as a threat in the mid-2000s and this method of extortion has continued to wreak havoc on individuals and businesses alike across the globe.  Last year saw a prolific increase in the number of new ransomware families and 2016 was dubbed ‘the year of ransomware’. All of these new families are armed with capabilities to encrypt various file types mobile devices and servers as well as computers.
Watch Now

Spotlight

It’s really quite simple: The more attack vectors that go unnoticed and the longer we allow attackers time to exploit our systems and infrastructure, the greater their chance for success. It’s on us to close that opportunity.


OTHER ON-DEMAND WEBINARS

What Makes a Security Rating? Deep Dive Into Threat Data Feeds

BitSight

Learn how threat data fits into security ratings. Cyber attacks and data breaches are a regular challenge for organizations and their cybersecurity practitioners today. The consequences for a company that falls victim to a hacking attack or other form of data breach can be significant, incurring both financial as well as reputational damage as a result. Measuring and determining the security posture of an organisation is essential to understand the liability and exposure to risk your business faces at any given moment, to reassure staff, shareholders, customers, insurers and suppliers.
Watch Now

What You Don't Know about Cryptography and How It Can Hurt You

"This presentation describes the gaps in most security professionals knowledge of crypto, why that is a problem, and how you can correct it."
Watch Now

National Small Business Week with Vision Computer Solutions: Cyber Security 101

Vision Computer Solutions

National Small Business Week is an annual week aimed at small and medium-sized business growth in all industries. In an effort to amplify National Small Business Week in Michigan. Vision Computer Solutions took part in a series of three 30-minute webinars to Michigan Chamber Partners all across the state of Michigan.
Watch Now

Application Security: Demonstrating True ROI

The application layer is the number-one attack vector, yet 2/3 of applications remain untested for vulnerabilities. This is because security professionals struggle to demonstrate the business case for...What will you learn?During this webinar, you will learn how one global insurer was able to demonstrate an application security programme ROI of 192% over three years factoring in:Cost of identifying and remediating security vulnerabilities,Time-to-market for internally developed software,Enterprise risk and security breach avoidance,Cost of ownership of application security programme.
Watch Now

Spotlight

It’s really quite simple: The more attack vectors that go unnoticed and the longer we allow attackers time to exploit our systems and infrastructure, the greater their chance for success. It’s on us to close that opportunity.

resources