Protect, Detect, Recover: The Three-Pronged Guide to Tackling Ransomware

Logo
Presented by

Bill Doerrfeld, tech journalist; Kevin Jackson, Trilio; Terence Jackson, Microsoft

About this talk

The digital transformation era hasn’t just been embraced by corporations, but by cybercriminals as well. With more employees working remotely, more mobile devices being used for work activity, and more data being stored than ever before, company infrastructures are increasingly vulnerable to ransomware attacks. Data shows that these attacks have grown in number and cost since the beginning of the pandemic; the cost of an average individual ransomware attack has increased 171% to over $312,000. What can organizations do? While it may be unrealistic to prevent every attack before it happens, it is possible to reduce vulnerabilities by implementing a thorough protection protocol for your data that utilizes the best in automated back-up technology. Layered on top of this should be a detection strategy that can identify an attack quickly and neutralize it before real damage is done. Finally, a reliable recovery system will ensure that any penetrated data storage is safely and efficiently restored. Companies don’t need to tackle this alone. In this second installment of Trilio’s series, “Proactive Protection: Building Resiliency Into Your Cloud-Native Data Strategy,” a panel of data security experts will break down the threat of ransomware and illuminate how to face it head on. Tune in to hear more about: — Why your organization may be more vulnerable to ransomware than you thought — How to address cybersecurity threats from multiple angles, for maximum protection — Ransomware preparedness plans and how to build one — And much more

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (18)
Subscribers (1059)
Trilio is a leader in cloud-native data protection for Kubernetes, OpenStack and Red Hat Virtualization environments. Customers in telecom, defense, automotive and financial services leverage TrilioVault to recover from disasters, protect against ransomware, migrate workloads, move workloads to new infrastructure and migrate to new software distributions. We're here to help you take full advantage of cloud-native architecture, safe in the knowledge that your data is secure, backed-up and agile. Stay tuned for more educational content on Cloud-native Innovation, Application Mobility, Data Protection, Disaster Recovery, Ransomware Protection, Kubernetes, Containers and more.