CF on Cyber: The Anatomy of a Ransomware Attack - Part 2

Carlton Fields
Contact
In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to See more +

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.

Carlton Fields Shareholder Jack Clabby joins Scott Moritz and Ron Yearwood, Senior Managing Directors at FTI Consulting, to discuss best practices for preventing and mitigating ransomware. See less -

Embed
Copy

Other MultiMedia by Carlton Fields

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Carlton Fields | Attorney Advertising

Written by:

Carlton Fields
Contact
more
less

Carlton Fields on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide