ransomware

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name
Published By: Cyren     Published Date: Jan 30, 2017
A Survey of the State of Ransomware, Phishing, and Business Email Compromise. Download now to learn more.
Tags : 
    
Cyren
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: Carbonite     Published Date: Feb 22, 2017
Find out how a lack of preparation puts businesses at risk from ransomware—and get expert advice on how to protect your data.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: Veeam Software     Published Date: Mar 09, 2017
This data availability solution is a best-practice for Health Care developed by HPE, Veeam®, and Comport Healthcare Solutions in response to increasing threats of Ransomware and other malware attacks.
Tags : 
    
Veeam Software
Published By: Veeam Software     Published Date: Mar 09, 2017
This data availability best practice is designed to ensure that all businesses effectively prepare for and avoid potential data loss and downtime from ransomware attacks. By following industry best practices, IT managers can avoid paying ransom and create a rock-solid data availability solution for day-today operations by leveraging both HPE and Veeam® software.
Tags : 
    
Veeam Software
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Mimecast     Published Date: Dec 29, 2016
Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack.
Tags : 
mimecast, security, ransomware, cybersecurity
    
Mimecast
Published By: Code42     Published Date: Oct 16, 2015
Hackers earn an average ROI of 1425% from ransomware ploys. How? They know the easiest way to circumvent your security measures is by exploiting your end users with a variety of manipulations, spoofs and message techniques.   Don't play by the ransomer's rules. Read the Reeling in Ransomware white paper to learn about the evolution of ransomware, ransomware tactics and how to neutralize its impact on your organization.
Tags : 
code42, hacker protection, ransomware, ransomware ploys, security, data protection, data protection measures, it management
    
Code42
Published By: Code42     Published Date: Aug 04, 2016
"Reeling in Ransomware provides a history of cryptoviral extortion, the most malicious of ransomware strains. In the past five years, hackers have reached new criminal heights powered by encryption technology sophistication. Since 2013, the Department of Justice estimates the CryptoLocker virus alone has compromised more than 260,000 computers worldwide. • Review the four primary ways cryptovirus code is planted. • Learn five tips to make humans less hackable. • Discover the single, infallible strategy for defeating ransomware."
Tags : 
    
Code42
Published By: Code42     Published Date: Oct 28, 2016
Interested in learning more about ransomware recovery for your organization? Watch this webinar now!
Tags : 
    
Code42
Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology, business technology
    
LogRhythm
Published By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : 
botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm
    
MX Logic
Published By: Lenovo     Published Date: Oct 14, 2016
Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!
Tags : 
security, ransomware, spyware, malware, theft, it threat
    
Lenovo
Published By: Sophos     Published Date: Mar 26, 2013
Our experts at SophosLabs look in depth at ransomware variants and delivery mechanisms, and show how you can protect your data with a complete security strategy.
Tags : 
ransomware, sophos, data, protect, security, strategy, business technology
    
Sophos
Published By: BitSight Technologies     Published Date: Sep 26, 2016
Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Read this BitSight Insights report to learn: - How the rate of ransomware infections has grown over the past year - Which industries have exhibited the most ransomware infections - How businesses can directly mitigate the threat of ransomware infections, as well as infections originating from third party vendors and suppliers
Tags : 
bitsight, cyber crime, cyber attacks, ransomware, cyber security, security, enterprise applications, business technology
    
BitSight Technologies
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails
    
McAfee
Published By: Druva     Published Date: Aug 03, 2016
Ransomware has quadrupled since last year and it is estimated to be reach $1B this year. Gartner Research has outlined best practices to better prepare you for an attack and uncovers how modern backup technologies can help.
Tags : 
druva, gartner, best practices, technology, backup, business technology
    
Druva
Published By: Druva     Published Date: Aug 05, 2016
Ransomware attacks have become commonplace and affect all kinds of organizations and industries nationwide. Learn why ransomware is on the rise and actionable steps to reduce the impact of ransomware and other malware attacks on your organization.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
    
Webroot Inc
Published By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : 
security, it management, business technology
    
CarbonBlack
Published By: CarbonBlack     Published Date: Oct 26, 2016
It’s become increasingly clear that traditional antivirus is no longer sufficient in stopping advanced threats such as ransomware. Companies need a next-generation antivirus (NGAV) solution to successfully stop modern attacks. Hear what Trevor Albrecht from DraftKings has to say about his experience replacing AV with NGAV.
Tags : 
security, it management, data management, business technology
    
CarbonBlack
Published By: Kaspersky     Published Date: Jun 15, 2015
Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.
Tags : 
kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
Kaspersky
Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security, company security
    
Kaspersky
Published By: Kaspersky     Published Date: Oct 26, 2016
Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.
Tags : 
kaspersky, hospital records, healthcare security, secure data, cybercrime
    
Kaspersky
Published By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat
    
Kaspersky
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.