The Life and Times of Ransomware: Before, During and After

September 13, 2018 from 05:00 PM – 06:00 PM UTC
|

With new threats identified daily, ransomware is a growing type of malicious malware that blocks you from your computing system and/or data until some amount money (a “ransom”) is paid. But, just how do these nefarious cyberattacks work?

Ransomware attacks strategically target exposed endpoints with known vulnerabilities that are used to deny access or encrypt data. According to Gartner, through the year 2020, 99 percent of vulnerabilities exploited will continue to be known by security and IT professionals for at least one year.

And the costs of ransomware are high. According to CSO Online, global ransomware damage costs are predicted to grow from $5 billon in 2017 to $11.5 billion by 2019. Even worse, the number of attacks is growing, with some estimates predicting that businesses will be hit by ransomware attacks every 14 seconds by the end of 2019.

With new threats identified daily, companies are struggling to prioritize and fix vulnerabilities they know exist. This webinar will outline tips and tricks you can use to stay ahead of the curve and protect your endpoints from ransomware.

Attend this webinar and learn:

  • Best practices to protect your endpoints before, during, and after a ransomware attack;
  • Steps you can take to improve endpoint management and security; and
  • Why endpoint management is critical to your overall security strategy.

Register Now

Speakers

Teresa Worth

Worldwide Portfolio Marketing Manager for Endpoint Security

Jeff Sherman

IBM Global Business Unit Executive - Endpoint Security

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today