Withstanding a Ransomware Attack: A Step-by-Step Guide

About this webinar

Recorded: February 7, 2017

Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

Watch the recording of our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

  • What you should do to ensure your data’s availability,
  • How to train your colleagues to avoid being caught on the hook of ransomware,
  • How to moderate the aftermath of a ransomware attack,
  • And more!
Hosted by
Jeff Melnick,
Solutions engineer

Active Directory 101: Install and Configure AD Domain Services

This webinar covers the first section of Exam 70-742, which focuses on effective installation and administration of Active Directory. In addition to providing step-by-step training from an AD expert, the session also explores the potential pitfalls of AD configuration and ways to ensure your configuration enhances the security of your IT environment.

Register for this session to learn:

  • How to install and configure domain controllers (DCs)
  • Best practices for creating AD users and computers
  • How to effectively approach AD group and organizational unit (OU) management
  • How Netwrix Auditor’s reporting functionality can help you identify security gaps in your AD configuration and maintain good IT hygiene
23
April
1pm EDT
23 April, 1pm EDT
Register Now