Protect Yourself Against Ransomware
Improving Your Cyber Security
Updated on Nov, 2023
Language - English
Duration -54 mins
A friend of mine runs his own successful accountancy firm and spends his time managing bookkeeping, payroll, and tar returns on behalf of his clients. One day he received an email from a client with an invoice attached, but soon after opening it, his computer started to act strange. Messages popped up on his screen, his desktop background changed, and he couldn't open any of the client files saved on his hard drives.
Because of this, he was unable to process any of his client's accounts, and as it was coming up to a tax deadline, his clients were faced with fines due to late and overdue filings. And because of that, his firm took knocked to its reputation which made some of his clients leave and scared others away from working with him. It was a very stressful and worrying time for him.
He finally had to call in a computer specialist firm to help and try to restore his data, but this cost him tens of thousands, and as his backups were not up to date, there were many late hours spent manually re-entering data into his systems. And even with that, there was a lot of client data that simply could not be restored.
These days, if you look at how he has set up his IT systems, you will see many layers of redundancy and security at play, and has a full Disaster Recovery plan in place to quickly overcome and IT disaster that could threaten his livelihood again.
In this course, you will learn how to recognize any gaps in the security of your IT systems and what you can do to plug them. By reducing your risk of cyber attack, you will not only protect your revenue and brand reputation, but also minimize the cost, scale and impact of any cyber attack if it does happen in the future.
What will you learn in this course:
Identify IT security risks
What are the main IT security threats to businesses
What must you do to stay secure in today's online world
A system & plan for improving your cyber security stance & readiness
What are the prerequisites for this course?
No requirements of prerequisites needed
Check out the detailed breakdown of what’s inside the course
Overview of Ransomware
- Current State of Ransomware 07:00 07:00
- How Has Ransomware Gotten This Far 04:10 04:10
- Timeline of an Attack 06:57 06:57
- Ransomware Demo - What Does an Attack Look Like 03:48 03:48
- Coming up with Better, Simpler Passwords 05:06 05:06
- Better, Simpler Passwords Demo 01:58 01:58
Protect Yourself Against Ransomware
Dermot DowneyProfessional systems administrator, educator and author
Dermot has over 15 years experience in IT and network administration in the pharmaceutical and financial industries. He has also been an educator on topics such as IT security and Unix administration.
He holds certifications in Cisco networking, network security and Linux administration, and has supported Red Hat, Debian and AIX systems in professional enterprises.
He believes in having fun in your work and enjoying what you do. He is passionate about IT systems, and believes strongly in passing this passion and skillset on to the next generation of IT enthusiast.
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.
Our students work
with the Best
Related Video CoursesView More
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video CoursesSubscribe now
Master prominent technologies at full length and become a valued certified professional.Explore Now