Identifying and Preparing for Ransomware Threats (Part Two of Two)

Ransomware response will depend on the risk tolerance of an organization, and companies should have comprehensive yet flexible response plans in place suited to their needs. This second installment of our two-part series on ransomware offers insights from technical and legal experts on effective response measures, including bringing in the experts to understand what happened and why, and whether to pay a ransom. It will also look at how cryptocurrency is changing the ransomware landscape. Part one covered the current methods of attack and their risks as well as prevention techniques and advance planning. See “Defending Against the Rising Threat of Ransomware in the Wake of WannaCry” (May 31, 2017).

To read the full article

Continue reading your article with a CSLR subscription.