veeam live | Whiteboard

How to Prevent Ransomware with Microsoft, Veeam & 3rd Party Technologies

Hosts: Jose Mendoza, Shawn Lieu, Jason Leiva

Watch Now Watch Now
Duration: 59:04
Published: 17 November, 2016

How much do you know about ransomware attacks? As IT pros, we are aware of ransomware’s impact and its triggers, but our clients, employees and families may not be. In these dark times, it’s imperative to know how to prevent a ransomware attack, because when it hits you — it’s already too late to find out you’ve left something uncovered.

In this VeeamLive episode, Duncan McAlynn discusses the threats we are facing today with APTs, DDoS attacks and advanced phishing schemes to demonstrate how Veeam®, Microsoft and third party solutions can help protect and prevent ransomware attacks on your critical virtual machine (VM) workloads.

During this webinar, we will be demonstrating Veeam and Microsoft’s solution accelerators, add-ons, community extensions and third-party products that address the susceptibility of your virtual workloads to these threats.

Duncan McAlynn is a Certified Information Systems Security Professional (CISSP), a six time Microsoft MVP and member of the FBI InfraGard division. He’s laser-focused on helping our nation’s corporations and government agencies expand their use of Microsoft System Center technologies to improve their security posture and compliance.

You don’t want to miss this informative webinar were you will learn:

  • The history of ransomware attacks
  • How your social media profiles can actually help cyber criminal develope a better attack
  • How prevent ransomware attacks trough malicious javascript ads known as drive-by infection
  • Why installing all the new patches to you OSs and having multiple scanning engines is a very important first step to protect against ransomware attacks
  • Easy way to test is your antivirus will protect you against malware
  • What is the typical approach that a company should take when is facing a ransomware attack
  • What you need to do in order to prevent ransomware from your IoT devices
  • Way protecting the forensics is an important step that you need to take when facing an attack
  • How to prevent attacks on your backups using the 3-2-1 rule

Register to watch