Artwork

Content provided by Chris Kousoulas. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Kousoulas or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

How to Prepare for a Ransomware Attack

18:17
 
Share
 

Manage episode 346068096 series 3410145
Content provided by Chris Kousoulas. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Kousoulas or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Every organization is susceptible to a ransomware attack, what should companies do to get ahead of the bad actors and build a plan to recover from an attack. Inventory the critical data and what the impact is if it was lost or exposed. What is the data worth, and would you pay? Decisions will be different in the heat of the moment!
Below are the top control to have in place against a ransomeware attack
# | Control Area
1 | Prevent workstations being compromised by phishing attacks
2 | Remediate internet facing vulnerabilities and reduce the attack surface
3 | Protect privileged accounts from being compromised
4 | Detect data moving outside of the organization
5 | Rapidly detect and contain incidents before they escalate
6 | Responding to a ransomware attack
7 | 3rd-party management
Articles - OneNeck CIS Assessment Sample Report (uberflip.com)
questions@theitwoodworker.com

  continue reading

28 episodes

Artwork
iconShare
 
Manage episode 346068096 series 3410145
Content provided by Chris Kousoulas. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Kousoulas or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Every organization is susceptible to a ransomware attack, what should companies do to get ahead of the bad actors and build a plan to recover from an attack. Inventory the critical data and what the impact is if it was lost or exposed. What is the data worth, and would you pay? Decisions will be different in the heat of the moment!
Below are the top control to have in place against a ransomeware attack
# | Control Area
1 | Prevent workstations being compromised by phishing attacks
2 | Remediate internet facing vulnerabilities and reduce the attack surface
3 | Protect privileged accounts from being compromised
4 | Detect data moving outside of the organization
5 | Rapidly detect and contain incidents before they escalate
6 | Responding to a ransomware attack
7 | 3rd-party management
Articles - OneNeck CIS Assessment Sample Report (uberflip.com)
questions@theitwoodworker.com

  continue reading

28 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide