What are the top vulnerabilities used in successful ransomware attacks? They lie within the Microsoft Remote Desktop Protocol (RDP) which is widely used to provide remote users with access to in-office systems, servers and files.
Webinar will cover:
- How to Minimize Vulnerabilties
- Vulnerability Indicators
- Common Mistakes
- Real-World Examples
Presented by Jeremy Rasmussen CTO, Abcode Cybersecurity and Roy “Caz” Caswell CIO, The Liberty Company Insurance Brokers, Inc.