Part II. Defensive Tactics

In Part II of this book, we cover a variety of defensive techniques you can employ to better protect your network, information, and users from ransomware and the criminals who use it.

We will be detailing methods to protect servers and systems compromised by ransomware, ways you can engage and train your users to be more aware of threats, and how you can use crowdsourced intelligence, along with proprietary intelligence from third parties, to better detect ransomware files and communications and stop the attack.

Get Ransomware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.