- Malvertisements: Mitigating malicious advertisement malwareTip - Expert Michael Cobb explains why malvertisements are so hard to control and what enterprises can do to help mitigate the risk of malicious advertisement malware.
- Evolving IT security threats: Inside Web-based, social engineering attacksTip - Attackers have mixed a dangerous cocktail of social engineering, Web-based attacks and persistence. Lenny Zeltser explains how your organization can keep from drowning in malware.
- Data breaches, spear phishing and application defensePodcast - Bit9 CTO Harry Sverdlove, the former principal research scientist at McAfee Inc., talks about the latest spate of data breaches and the lessons that can be gleaned from them.
Malware, virus, Trojan and spyware protection and removal from searchSecurity.com
Answer -Knowing what ransomware recovery methods are available is important as the threat continues to grow. Expert Judith Myerson outlines what the NIST recommends for enterprises.
Feature -A flat backup approach could help your organization recover easier if it's hit by ransomware. There are snapshot-based options available from system and backup software providers.
ehandbook_cover -The best email security policy requires a holistic approach of the issue, understanding both the problem's scope and the most likely threats.