Ransomware Protection

  • Ransomware: Anatomy of an Attack4:00

    Ransomware: Anatomy of an Attack

    Ransomware is wreaking havoc. Most people probably know what ransomware is, but how exactly does it work? Learn more in this dramatic 4 minute video.

    Watch Video
  • Cloud Application Security- The current landscape, risks, and solutions

    Cloud Application Security- The current landscape, risks, and solutions

    As remote employees use work devices for personal activities, and personal devices for work activities, cloud-based apps – especially unauthorized cloud apps – are more popular than ever.

    Read PDF
  • Ransomware Realities: The Fallout of Recent U.S. and International Cyberattacks on Corporate America48:50

    Ransomware Realities: The Fallout of Recent U.S. and International Cyberattacks on Corporate America

    Ransomware and incident response expert Duncan McAlynn shares insights into what has caused the recent spikes in ransomware attacks, and how to respond.

    Watch Video
  • Ransomware Defense For Dummies - 2nd Edition

    Ransomware Defense For Dummies - 2nd Edition

    Cisco Umbrella's popular Ransomware Defense For Dummies eBook explores the top cyber security best practices to reduce ransomware risks.

    Read PDF
  • Ransomware Defense For Dummies Checklist

    Ransomware Defense For Dummies Checklist

    Our safety checklist will ensure you are ready to defend your organization’s data against the threat of ransomware.

    Go to page
  • The 3 riskiest cloud applications of 2021

    The 3 riskiest cloud applications of 2021

    Are you using vulnerable cloud apps that open the door to ransomware, malware, or other types of network attacks? Our Cisco Umbrella infographic reveals three of the riskiest ones.

    Go to page
  • The cost of ransomware attacks: Why and how you should protect your data

    The cost of ransomware attacks: Why and how you should protect your data

    As the COVID-19 pandemic ravaged the world in 2020, ransomware attacks grew to epidemic proportions of their own. Almost every day, both large and small companies across every industry – all...

    Go to page
  • Using DNS-layer security to detect and prevent ransomware attacks

    Using DNS-layer security to detect and prevent ransomware attacks

    This year has seen a dramatic uptick in ransomware attacks, with high-profile incidents like the Colonial Pipeline attack or the Kaseya attack dominating news cycles. The frequency and cost of...

    Go to page
  • How unifying security tools can streamline threat hunting37:29

    How unifying security tools can streamline threat hunting

    Phishing, malvertising, spam, trojans, ransomware, and information stealers are on the rise. View now to learn about key threat trends facing businesses like yours in 2021.

    Watch Video
  • Cisco Umbrella DNS-layer Security0:27

    Cisco Umbrella DNS-layer Security

    See how DNS-layer security can quickly and easily help you secure your network by blocking malware, ransomware, phishing and more.

    Watch Video
  • Cloud Application Security – Risks, Questions, Insights, and Solutions

    Cloud Application Security – Risks, Questions, Insights, and Solutions

    Cloud-based applications have helped make a new world of work possible. But they have also opened up the doors to new risks and threats, such as ransomware by remote desktop takeover and data loss...

    Go to page
  • Boston Medical Center: Cisco Umbrella Customer Experience2:42

    Boston Medical Center: Cisco Umbrella Customer Experience

    Boston Medical Center chose Cisco Umbrella as their first line of defense to protect highly sensitive patient, employee and research data against malware, ransomware and other threats.

    Watch Video
  • Umbrella Customer Experience: Yelp2:24

    Umbrella Customer Experience: Yelp

    Watch how Yelp built automation into the company's cybersecurity practice by utilizing the Cisco Umbrella Investigate API to reduce malware and ransomware attacks.

    Watch Video
  • CISA Reports: Increased ransomware attacks targeting K-12 school districts

    CISA Reports: Increased ransomware attacks targeting K-12 school districts

    There has been heightened attention (and in some cases, scrutiny) on the reopening plans for K-12 school districts across the nation. If the decision of whether or not to send your kid back to...

    Go to page
  • Octapharma Routs Out Ransomware

    Octapharma Routs Out Ransomware

    Learn how Octapharma, a global medical manufacturer, routs out ransomware by utilizing Cisco Umbrella cybersecurity.

    Read PDF
  • Deconstructing the Ransomware Kill Chain: Critical Information Held Hostage56:24

    Deconstructing the Ransomware Kill Chain: Critical Information Held Hostage

    Today's hackers want to profit from your data and have found a new way to do it. Holding your data hostage and making you pay to get it back. Too often we focus on the confidentiality and integrity of

    Watch Video
  • Why Ransomware Remains Resilient - and what to do about it!38:22

    Why Ransomware Remains Resilient - and what to do about it!

    See why ransomware still remains an unfortunately reality for organizations of all sizes, and all industries.

    Watch Video
  • Ransomware attacks, trojans, and loaders

    Ransomware attacks, trojans, and loaders

    Summer may be winding down, but August was still an active month for cybercriminals. In this edition of Threat Spotlight, our cybersecurity threat analysis team discusses the ransomware attacks,...

    Go to page
  • Most common cybersecurity threats of 2021 broken down by industry

    Most common cybersecurity threats of 2021 broken down by industry

    In today’s modern threat landscape, it’s hard to properly allocate resources where they’re needed most. Is it cryptomining, ransomware, phishing or some new threat that no one has faced before? It...

    Go to page
  • Healthcare industry under threat of trojan and ransomware attacks

    Healthcare industry under threat of trojan and ransomware attacks

    On October 28, 2020, a joint advisory was issued from the United States Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of...

    Go to page
  • loading
    Loading More...