Ransomware has evolved from its early sneaker-net roots, leveraging the Internet and email to spread to different computers. However, it still follows a predictable script, not all that different from the original AIDS Trojan.

In this guide, we’ll help you better understand the role that bitcoin plays in ransomware, various types of ransomware, attack vectors, and cover a few mitigation methods.

Chapters include:

  • What Bitcoin Has to Do with Ransomware
  • Should You Pay?
  • Major Types of Ransomware
  • Attack Vectors
  • Mitigation Methods

Download today!

What Bitcoin Has to Do with Ransomware.
 
 
Should You Pay?

Major Types of Ransomware 

Attack Vectors  There’s a better way!

11 Things IT Should Be Doing (But Isn’t)

This free whitepaper outlines 11 things that most IT departments aren’t doing, but should.  As a result, sensitive data is unprotected and being accessed by the wrong people, expensive storage is littered with stale data, and access controls are broken.  Which of the 11 things are you missing?

  

Download the Whitepaper!