Addressing the Vulnerabilities Used in 63.5% of Ransomware Attacks

What are the top vulnerabilities used in successful ransomware attacks? They lie within the Microsoft Remote Desktop Protocol (RDP) which is widely used to provide remote users with access to in-office systems, servers and files.

Webinar will cover:

  • How to Minimize Vulnerabilties
  • Vulnerability Indicators
  • Common Mistakes
  • Real-World Examples

Presented by  Jeremy Rasmussen  CTO, Abcode Cybersecurity and Roy “Caz” Caswell CIO, The Liberty Company Insurance Brokers, Inc.

Addressing the Vulnerabilities Used in 63.5% of Ransomware Attacks

Apptega
On-demand
60 minutes




    Continue
    Your personal data will be used only for cybersecurity related email campaigns (webinars, cybersec info & various offers related to your field of interest). You may opt out at any time by clicking here: Unsubscribe