SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

Security Feature

May 05, 2016


Ransomware is Real: Webinar Tells How To Protect Yourself Now


By Rory J. Thompson, Web Editor

One of the most prevalent forms of malware in today’s world of cybersecurity is known as ransomware. After loading the software on to a device, a hacker or other miscreant can lock up important emails or other files and hold them hostage – usually under the threat of releasing the information -- until the device’s owner pays a fee; or more aptly, a ransom. It used to be just a great way for hackers to make a quick buck; now seems as though the threat is evolving.




Hospitals are prime targets for ransomware due to the type of information they deal with on a daily basis. Patient information, health history, payment information, Social Security numbers – all of these are hot ticket pieces of data that are perfect for identity theft and other types of cyber crime. Criminals are seeing dollar signs.

In fact, cyber crime is one of the greatest threats to business and consumer Internet use. Although users of the Internet have, for the most, part taken advantage of preventative software and antivirus programs, cyber criminals continue to find ways through the barriers that conscientious people and companies set up on their networks. What can a vulnerable enterprise do?

Online security leader Sophos has one solution. They know that from ransomware to rootkits, old school security simply cannot keep pace with today’s advanced attacks. So they’re hosting a webinar to teach how these threats work, and how to protect against them. 

Interested users can join Dan Schiappa, GM for Sophos Enduser Security Group, for a live webcast on Next-Generation End-user Protection titled, “Next-Gen Now: Outsmarting Ransomware, Rootkits, and Zero-Day Attacks.”

In it, they’ll learn how to can get innovative endpoint protection without impacting performance. 

The webinar takes place Tuesday, May 10, from 2:00 p.m. to 3:00 p.m. (EDT). Among the steps to be explained will be how to:

  • Prevent: Stop the exploits before they hit by thwarting the attack methods of attacks used by advanced persistent threats;
  • Detect: Use the intelligence of next-generation endpoint and network security to detect and isolate attacks; and
  • Respond: Laser in on critical alerts and address them with contextual security intelligence.

Is it time you got proactive about security? If so, reserve your spot now. The threat is NOT going away.




Edited by Stefania Viscusi

Featured Webinars


Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy