The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks
Written by Alan Calder
Narrated by Stephen Perring
()
Currently unavailable
Currently unavailable
About this audiobook
The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network.
Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing.
It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing.
The Ransomware Threat Landscape
This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation.
Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff – in fact, all staff who use their organisation's network/online systems to perform their role – The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face.
From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include:
- Introduction
- About ransomware
- Basic measures
- An anti-ransomware
- The control framework
- Risk management
- Controls
- Maturity
- Basic controls
- Additional controls for larger organiations
- Advanced controls
Don't delay – start protecting your organisation from ransomware and buy this book today!
About the author
Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru, and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications).
Alan has consulted for clients across the globe and is a regular media commentator and speaker.
Alan Calder
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
More audiobooks from Alan Calder
ISO 22301: 2019 - An introduction to a business continuity management system (BCMS) Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsNine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 0 out of 5 stars0 ratingsEU GDPR – An international guide to compliance Rating: 5 out of 5 stars5/5ISO/IEC 38500: A pocket guide, second edition Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsISO27001/ISO27002:2013: A Pocket Guide Rating: 5 out of 5 stars5/5
Related to The Ransomware Threat Landscape
Related audiobooks
Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Ransom War: How Cyber Crime Became a Threat to National Security Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5Cloud Security For Dummies Rating: 5 out of 5 stars5/5A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 4 out of 5 stars4/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Cybersecurity Essentials: Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams Rating: 0 out of 5 stars0 ratingsIntelligent Safety: How to Protect Your Connected Family from Big Cybercrime Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5Cyber Security for Beginners: Safeguarding Your Cyber Space Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Who Stole My Inheritance: It Starts with Elder Abuse Rating: 0 out of 5 stars0 ratingsSecuring Your Data: A Cybersecurity Guide: Essential Techniques for Safeguarding Your Information Rating: 0 out of 5 stars0 ratingsCybersecurity: Cybersecurity Essentials: Safeguarding Your Digital World Rating: 0 out of 5 stars0 ratingsCyber Scams: Protect Yourself from Online Threats Rating: 5 out of 5 stars5/5Cyber Warfare in 2022+: Attack Techniques and Espionage Tactics of Cybercrime Groups and Nationstates Rating: 0 out of 5 stars0 ratingsCybersecurity Unveiled: Protecting Your Digital World in the Age of Information Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Hackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsCorporate Finance and Financial Modeling Rating: 0 out of 5 stars0 ratings
Security For You
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 4 out of 5 stars4/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5The Bitcoin Standard: The Decentralized Alternative to Central Banking Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 4 out of 5 stars4/5Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Rating: 4 out of 5 stars4/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsFAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Red Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5COMPTIA NETWORK+: Tips and Tricks to Learn and Study about The CompTIA Network+ Certification from A-Z Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 4 out of 5 stars4/5Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Rating: 4 out of 5 stars4/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5
Reviews for The Ransomware Threat Landscape
0 ratings0 reviews
