Ransomware Defense: How to avoid falling victim to the next “WannaCry” [Webinar]

June 5, 2017 | By Comodo

Join NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar to learn how you can protect yourself against ransomware.

Register here: https://www.comodo.com/landing/wannacry-ransomware-endpoints-protection/?af=9030

By now, you’ve surely heard of WannaCry. The ransomware made headlines around the world by infecting over 300,000 machines in 150 countries in a matter of days. Fortunately, a “kill switch” discovered just hours after WannaCry’s May 12 release slowed the attack, and a few days later, the ransomware was all but dead. Crisis averted, right?

Well, not exactly.

The State of Ransomware

By all accounts, ransomware incidents have risen over the past couple years. A report from the Department of Justice noted a 300-percent increase in daily ransomware attacks from 2015 to 2016, and a Ponemon Institute survey from Jan. 2017 reported that 51-percent of companies had experienced at least one ransomware attack in the past year. Most estimates placed ransomware costs at around $1 billion in 2016, and that number is expected to rise in 2017.

In other words, WannaCry was just the tip of the iceberg.

So, how can you Protect Yourself?

Join NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar to learn:

  • Why detection and sandboxing solutions are largely ineffective against ransomware
  • Why 2017 may become the most costly year ever for ransomware attacks
  • About a cyber security solution that can stop ransomware from infecting your enterprise, regardless of any backdoors, exploits, or vulnerabilities your endpoints may have

First 50 registrants will get a free forensic analysis to detect unknown malware lurking on their endpoints. Seats are limited, so save yours today.

Register here: https://www.comodo.com/landing/wannacry-ransomware-endpoints-protection/?af=9030

Endpoint security

Be Sociable, Share!

    Add new comment

    Your name
    Comment

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>