The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks
Written by Alan Calder
Narrated by Stephen Perring
()
About this audiobook
The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network.
Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing.
It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing.
The Ransomware Threat Landscape
This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation.
Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff – in fact, all staff who use their organisation's network/online systems to perform their role – The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face.
From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include:
- Introduction
- About ransomware
- Basic measures
- An anti-ransomware
- The control framework
- Risk management
- Controls
- Maturity
- Basic controls
- Additional controls for larger organiations
- Advanced controlsDon't delay – start protecting your organisation from ransomware and buy this book today!
About the author
Alan Calder is the Group CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru, and a leading author on information security and IT governance issues. He has been involved in the development of a wide range of information security management training courses that have been accredited by IBITGQ (International Board for IT Governance Qualifications).
Alan has consulted for clients across the globe and is a regular media commentator and speaker.
Alan Calder
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
More audiobooks from Alan Calder
EU GDPR – An international guide to compliance Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratings
Related to The Ransomware Threat Landscape
Related audiobooks
Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsWell Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5The Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals: How to Establish Effective Security Management Functions Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsHACKING: Denial of Service Attacks Rating: 4 out of 5 stars4/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Cybersecurity For Beginners: How to apply the NIST Risk Management Framework Rating: 0 out of 5 stars0 ratingsCISSP: A Comprehensive Beginners Guide on the Information Systems Security Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsThe Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes Rating: 0 out of 5 stars0 ratingsMalware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsThe Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Through the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Blockchain For Dummies Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5
Reviews for The Ransomware Threat Landscape
0 ratings0 reviews