Defending Your Small Business From Big Threats

Logo
Presented by

Eric Bodkin, Director, Falcon Recovery Services

About this talk

Though most reporting on cyberattacks focuses on the impacts to large companies, the truth is that small businesses are not immune. 60% of small and medium businesses reported ransomware attacks in 2020. eCrime groups know that small businesses rarely have the resources to defend themselves in the same way as large enterprises, which can make them lucrative targets for ransomware and cyber extortion. The threats are real, and the days of protecting your organization with simple antivirus and a firewall are gone. What can you do when you lack a full staff of cybersecurity experts to defend your business? Are you comfortable wearing the Chief Information Security Officer hat for your small business? In this webinar, CrowdStrike’s Eric Bodkin will examine the cyber threats that target small businesses, sharing real-world examples plucked from the CrowdStrike case files. This will set the stage for a discussion of the building blocks of a successful cyber defense, and practical guidance for defending your business. Join this webcast to learn about: • Common cybersecurity misconceptions for small business • Real-world case studies of cyber intrusions and what could have been done to stop the • The basic structure of a successful cybersecurity program, including next-generation prevention, threat hunting, investigation and real-time response • How small businesses are using managed services to see, stop and prevent determined attackers, skipping the burden of building and managing a program themselves
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (188)
Subscribers (32280)
CrowdStrike has redefined security with the world’s most advanced cloud-native platform for protecting critical areas of risk — endpoints and cloud workloads, identity, and data. The Falcon® platform harnesses real-time threat intelligence and enterprise telemetry to automate threat prevention, detection, remediation, hunting, and vulnerability observability through a single, intelligent, lightweight agent.