Taste of Premier    - Channel 9

Microsoft Services Premier Support gives you direct access to the world's top Microsoft technical experts, pairing you with a dedicated support team providing 24/7 hands-on assistance. "Taste of Premier" is dedicated to helping you maximize your company's IT infrastructure and development investment by showcasing the latest Microsoft products and services and demonstrating how these technologies can positively impact your bottom line.

https://s.ch9.ms/Blogs/Taste-of-Premier

subscribe
share



 

The Threat of Ransomware: How to Protect Your System from Ransomware and other Malicious Cyber Attacks


Ransomware is a type of malware that holds computers or files for ransom by encrypting files or locking the desktop or browser on systems that are infected with it, then demanding a ransom in order to regain access.

The rise of ransomware and its media presence in recent months has highlighted, perhaps now more than ever, the importance of robust security systems to detect and respond to devious and evolving threats.Join Lex Thomas as he welcomes back Paul Bergson to the show as they discuss some common ransomware tactics and how you can successfully defend your systems and data.

  • [06:40] What are some common ransomware tactics we should be aware of?
  • [17:49] How can Microsoft help against these attacks?
  • [22:20] DEMO: How AppLocker can help against Malware attacks  
  • [34:46] How can Microsoft help against email attacks?
Learn more about  Microsoft Premier Support Services.
  • Send your comments or questions to the "Taste of Premier" Podcast show!
  • Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS
__________________________Websites & Blogs:
  • Microsoft Services Premier Support
  • Microsoft Cybersecurity
Videos:
  • Privileged Access Workstations (PAWs): How to Prevent Attackers from Sensitive Accounts and Tasks
  • Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware
  • How to Mitigate Pass-the-Hash and Other Forms of Credential Theft
  • Securing your Desktop: How a Threat Becomes a Security Patch
  • Microsoft Security Risk Assessment - How to Optimize Your IT Security Program
  • Microsoft Threat Detection Service Overview
  • Cybersecurity Incident Response
  • Securing Your Active Directory Environment
  • Protect Your Enterprise with the Enhanced Mitigation Experience Toolkit
  • Proactively Secure your IT Environment from Credential Theft with POP-SLAM
  • Ransomware 101: How to Protect and Mitigate your environment from Malware


share





 2017-10-04  48m