Ransomware Protection Playbook
- Length: 320 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2021-10-12
- ISBN-10: 1119849128
- ISBN-13: 9781119849124
- Sales Rank: #1279212 (See Top 100 Books)
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day.
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
In addition to walking you through the necessary technical preventative measures, this critical book will show you how to:
- Quickly detect an attack, limit the damage, and decide whether to pay the ransom
- Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage
- Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business
A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data.
Cover Table of Contents Title Page Introduction Who This Book Is For What Is Covered in This Book? How to Contact Wiley or the Author Part I: Introduction Chapter 1: Introduction to Ransomware How Bad Is the Problem? Types of Ransomware Summary Chapter 2: Preventing Ransomware Nineteen Minutes to Takeover Good General Computer Defense Strategy Understanding How Ransomware Attacks Preventing Ransomware Beyond Self-Defense Summary Chapter 3: Cybersecurity Insurance Cybersecurity Insurance Shakeout Did Cybersecurity Insurance Make Ransomware Worse? Cybersecurity Insurance Policies The Insurance Process What to Watch Out For Future of Cybersecurity Insurance Summary Chapter 4: Legal Considerations Bitcoin and Cryptocurrencies Can You Be in Legal Jeopardy for Paying a Ransom? Is It an Official Data Breach? Preserve Evidence Legal Defense Summary Summary Part II: Detection and Recovery Chapter 5: Ransomware Response Plan Why Do Response Planning? When Should a Response Plan Be Made? What Should a Response Plan Include? Practice Makes Perfect Summary Chapter 6: Detecting Ransomware Why Is Ransomware So Hard to Detect? Detection Methods Example Detection Solution Summary Chapter 7: Minimizing Damage Basic Outline for Initial Ransomware Response Stop the Spread Initial Damage Assessment First Team Meeting Determine Next Steps Summary Chapter 8: Early Responses What Do You Know? A Few Things to Remember Major Decisions Early Actions Summary Chapter 9: Environment Recovery Big Decisions Rebuild Process Summary Recovery Process Summary Summary Chapter 10: Next Steps Paradigm Shifts Improve Overall Cybersecurity Hygiene Summary Chapter 11: What Not to Do Assume You Can't Be a Victim Think That One Super-Tool Can Prevent an Attack Assume Too Quickly Your Backup Is Good Use Inexperienced Responders Give Inadequate Considerations to Paying Ransom Lie to Attackers Insult the Gang by Suggesting Tiny Ransom Pay the Whole Amount Right Away Argue with the Ransomware Gang Apply Decryption Keys to Your Only Copy Not Care About Root Cause Keep Your Ransomware Response Plan Online Only Allow a Team Member to Go Rogue Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy Summary Chapter 12: Future of Ransomware Future of Ransomware Future of Ransomware Defense Summary Parting Words Index Copyright Dedication About the Author About the Technical Editor Acknowledgments End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.