Time: 10:00 AM (PST) / 1:00 PM (EST)
Date: October 18, 2016
Anatomy of a Ransomware Attack
Did you know that just opening a compromised web page could allow dangerous code to install on a PC or smartphone? You don’t have to click “accept” for a download or software update to install malware on your machines and trigger an infection and the consequences can be enormous.
Why you need to build 24 X 7 threat monitoring into your environment
Ransomware is an extremely profitable type of attack. It only takes one network-connected device to expand a malware infection and hold an entire organization hostage for profit. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
- Learn from our cyber security experts about what can happen in a ransomware attack, based on real-life events.
- Understand how the malware entered the IT infrastructure of two different companies, and find out how long it stayed and the impact to these businesses.
- Learn more about how attacks are identified and remediated, as well as some best practices for handling ransomware attacks, should one occur in your company.
Improve your line of defense against ransomware and minimize the loss of key data, money and intellectual property from your organization.
Register Here http://bit.ly/SymantecWebinar1018blog
[1] Source: Symantec ISTR 2015