Ransomware is an epidemic. In the blink of an eye, everything from your financial records to emails to file shares have been encrypted, possibly never to be seen again. This is the nightmare that organizations around the world have faced, as they grapple with the most destructive and terrifying of all cyberattacks. Our ransomware training class shows you how to quickly respond and minimize losses.
What makes the dark web so dark? In this talk, we’ll show you how the dark web works, explore extortion sites where criminal gangs publish stolen data, and show you screenshots of darknet markets where criminals peddle hacking tools, stolen personal info and more.
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp.
Encryption is a powerful security tool that can protect confidential data, stop hackers from breaking in, and verify the identity of remote users. But how does this mysterious technology work?
Cybercriminals are taking hacking to the next level, by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear about the latest cybercriminals tactics, including supply-chain hacks, new phishing tactics, and cloud hacking.
‘Tis the season for payment card breaches and holiday scams! As the end of the year approaches, criminals are working overtime to take advantage of busy employees, trusting consumers, and vulnerable payment processing systems. In this webinar, we’ll discuss techniques criminals use to steal card numbers, including the latest information-stealing malware and eCommerce site hacks.
Do you hate passwords? Have trouble remembering them? You’re not alone. The good news is that today’s technology provides you with options for successfully managing passwords.
There are a zillion ways for criminals to break into your networks and your physical space, and defending against today’s threats can seem overwhelming. However, there are simple steps you can take to break down seemingly complex cybersecurity problems and conquer them.