LockDown 2022: 3 Ways Desktops are a Threat Actors Best Friend & What You Can Do

Logo
Presented by

Nick Cavalancia, (Microsoft MVP)

About this talk

It’s no secret that cyberattacks need a foothold within your organization. And given Microsoft holds that an attacker sits undetected on your network for a median of 146 days, there has to be a reason beyond “they just such an amazing hacker.” In reality, there are plenty of ways your Windows desktops actually **help** the bad guy continue their malicious activities that result in stolen data, encrypted systems, and compromised environments. So, how are threat actors taking advantage of your Windows desktops, and what should you do to stop them? In this lively webcast, join Microsoft MVP, Nick Cavalancia, as he discusses: • Why threat actors love Windows endpoints • 3 examples of how endpoints are used within a cyberattack to the benefit of the threat actor • Ways you can lockdown your desktops to reduce the attack surface and thwart malicious actions

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (161)
Subscribers (5222)
Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach. Our solutions also limit the impact of attacks by helping IT teams detect, respond and recover from them faster and with less effort. Over 13,000 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.