Ransomware is one of the fastest growing classes of malicious software. Attackers don’t even have to bother stealing and selling the data you or your business relies on – they just encrypt it and demand a ransom. Ransomware has evolved from simple screenblockers demanding payment to a huge wave of far more dangerous software: you can’t afford to leave any stone unturned in the fight against crypto-locker attacks. This white paper examines the most effective methods of mitigating the risks posed by crypto-malware, including the effectiveness of host-based and server-based approaches, alone and in combination . Learn how you can avoid helping to fund cybercrime through ransom payments which feed the industry and prompt the creation of even more malicious software.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership