ActualTech Media moderators David Davis and Scott Bekker had an interesting discussion recently about phishing attacks and how prevalent they remain. This has special relevance to ransomware, as so many ransomware incidents start as phishing attacks. Some of the highlights of their chat include: It’s worth checking out this quick discussion, which served to introduce […]
We recently asked renowned Ransomware Expert Allan Liska: “What takes place during a tabletop exercise and why is it useful to do?” see his response in this video, and in case you’ve missed it, here’s the transcript: James Green: So, one of the ways that folks can be best prepared for a potential ransomware attack […]
We recently asked renowned Ransomware Expert Allan Liska: “What are the “big” common attack vectors that ransomware actors use?” see his response in this video, and in case you’ve missed it, here’s the transcript: James Green: Ransomware attackers often get in using one of only a couple popular mechanisms, and so if we can be […]
We recently asked renowned Ransomware Expert Allan Liska: “What should you be on the lookout for to stop an attack in progress and avoid the worst of it?” see his response in this video, and in case you’ve missed it, here’s the transcript: James Green: Ransomware attackers follow a pretty consistent playbook most of the […]
We recently asked renowned Ransomware Expert Allan Liska: “Do you have any recommendations for securing active directory?” See his response in this video, and in case you’ve missed it, here’s the transcript: James Green: So once attackers gain entry to a network, the next thing they’re looking to do is escalate privileges, take control of […]
We recently asked renowned Ransomware Expert Allan Liska: “What should you do, if you’ve been encrypted?” see his response in this video, and in case you’ve missed it, here’s the transcript: Scott Bekker: Allan, let’s talk about disaster recovery and disaster recovery planning in particular. A lot of the terms that you’ll see people talking […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS