
Deep Dive Session: "Ransomware-secure backup strategy"
Which IT security measures can actually protect the backups?
Topic
Network Security / Patch ManagementTrend topic
When & Where
Details
Format:
Workshop
Language:
German
Session description
Companies' central storage and backup systems are an attractive target: Encrypted or stolen data can be used to extort large ransoms.
After attackers have surreptitiously taken over a workstation, they attempt to exploit vulnerabilities in backup systems, encrypting them, or simply destroying them. It therefore makes sense to focus not only on endpoints, firewalls, and gateways when implementing malware and ransomware protection measures, but also to consider how backup systems can be protected from malware and ransomware.
In this deep-dive session, we will use concrete examples to demonstrate how malware and ransomware can penetrate companies, bypass security measures, and penetrate central backup systems. Building on this, he will present which measures can actu ...
After attackers have surreptitiously taken over a workstation, they attempt to exploit vulnerabilities in backup systems, encrypting them, or simply destroying them. It therefore makes sense to focus not only on endpoints, firewalls, and gateways when implementing malware and ransomware protection measures, but also to consider how backup systems can be protected from malware and ransomware.
In this deep-dive session, we will use concrete examples to demonstrate how malware and ransomware can penetrate companies, bypass security measures, and penetrate central backup systems. Building on this, he will present which measures can actu ...
Sponsored by