Book description
Avoid becoming the next ransomware victim by taking practical steps today
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day.
In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.
In addition to walking you through the necessary technical preventative measures, this critical book will show you how to:
- Quickly detect an attack, limit the damage, and decide whether to pay the ransom
- Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage
- Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business
A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data.
Table of contents
- Cover
- Title Page
- Introduction
- Part I: Introduction
-
Part II: Detection and Recovery
- Chapter 5: Ransomware Response Plan
- Chapter 6: Detecting Ransomware
- Chapter 7: Minimizing Damage
- Chapter 8: Early Responses
- Chapter 9: Environment Recovery
- Chapter 10: Next Steps
-
Chapter 11: What Not to Do
- Assume You Can't Be a Victim
- Think That One Super-Tool Can Prevent an Attack
- Assume Too Quickly Your Backup Is Good
- Use Inexperienced Responders
- Give Inadequate Considerations to Paying Ransom
- Lie to Attackers
- Insult the Gang by Suggesting Tiny Ransom
- Pay the Whole Amount Right Away
- Argue with the Ransomware Gang
- Apply Decryption Keys to Your Only Copy
- Not Care About Root Cause
- Keep Your Ransomware Response Plan Online Only
- Allow a Team Member to Go Rogue
- Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy
- Summary
- Chapter 12: Future of Ransomware
- Index
- Copyright
- Dedication
- About the Author
- About the Technical Editor
- Acknowledgments
- End User License Agreement
Product information
- Title: Ransomware Protection Playbook
- Author(s):
- Release date: October 2021
- Publisher(s): Wiley
- ISBN: 9781119849124
You might also like
book
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This …
book
Cyber Breach Response That Actually Works
You will be breached—the only question is whether you'll be ready A cyber breach could cost …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
How to Hack Like a Ghost
Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based …