Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
The Ransomware Hostage Rescue Guide
Channel

The Ransomware Hostage Rescue Guide

Truth in IT
06/20/2019

It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.

In this webcast we will cover:

  • What new scary ransomware strains are in the wild
  • Am I infected?
  • I’m infected, now what?
  • Proven methods of protecting your organization?
  • How to create a “human firewall”

Don’t get held hostage and become a statistic! Join us to learn how to avoid these scary attacks.

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
  • » Cybersecurity » Network Security
  • » Webinar Library » KnowBe4
Tags:
  • knowbe4
  • kron
  • phishing
  • bec
  • security
  • webcast

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

                Channel's Comments: The Ransomware Hostage Rescue Guide

                Upcoming Webinar Calendar

                • 03/11/2026
                  01:00 PM
                  03/11/2026
                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                  https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
                • 03/11/2026
                  01:00 PM
                  03/11/2026
                  Introducing the Netskope AI Launch for the Americas
                  https://www.truthinit.com/index.php/channel/1850/introducing-the-netskope-ai-launch-for-the-americas/
                • 03/12/2026
                  12:00 AM
                  03/12/2026
                  Unveiling the Netskope AI Initiative in the APAC Region
                  https://www.truthinit.com/index.php/channel/1849/unveiling-the-netskope-ai-initiative-in-the-apac-region/
                • 03/12/2026
                  06:00 AM
                  03/12/2026
                  Introducing the Netskope AI Revolution in EMEA
                  https://www.truthinit.com/index.php/channel/1848/introducing-the-netskope-ai-revolution-in-emea/
                • 03/17/2026
                  06:00 AM
                  03/17/2026
                  L'importance cruciale de l'ITDR pour 2026 et au-delà
                  https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
                • 03/18/2026
                  01:00 PM
                  03/18/2026
                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                  https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
                • 03/19/2026
                  11:00 AM
                  03/19/2026
                  Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                  https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
                • 03/19/2026
                  01:00 PM
                  03/19/2026
                  Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                  https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
                • 03/26/2026
                  01:00 AM
                  03/26/2026
                  Reclaim Network Clarity and Accountability with Netskope DEM
                  https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
                • 03/26/2026
                  05:00 AM
                  03/26/2026
                  ITDR as an Integral Component of Critical Security Architecture
                  https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                  https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
                • 03/26/2026
                  01:00 PM
                  03/26/2026
                  Making GPUs Available On Demand (Without Breaking the Budget)
                  https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
                • 04/08/2026
                  01:00 PM
                  04/08/2026
                  Managing Configuration at Scale Across Group Policy and Intune
                  https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

                Upcoming Spotlight Events

                • Mar
                  11

                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                  03/11/202601:00 PM ET
                  • Mar
                    18

                    Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                    03/18/202601:00 PM ET
                    • Mar
                      19

                      Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                      03/19/202601:00 PM ET
                      • Mar
                        26

                        Making GPUs Available On Demand (Without Breaking the Budget)

                        03/26/202601:00 PM ET
                        • Apr
                          08

                          Managing Configuration at Scale Across Group Policy and Intune

                          04/08/202601:00 PM ET
                          More events

                          Upcoming Industry Events

                          • Mar
                            11

                            Introducing the Netskope AI Launch for the Americas

                            03/11/202601:00 PM ET
                            • Mar
                              12

                              Unveiling the Netskope AI Initiative in the APAC Region

                              03/12/202612:00 AM ET
                              • Mar
                                12

                                Introducing the Netskope AI Revolution in EMEA

                                03/12/202606:00 AM ET
                                More events
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version