All episodes
-
Part 1: 5 Steps to Cyber Resilience - It begins with Backup
Alan Bull and Simon Mitrevski, Carbonite + Webroot, an Opentext company
Achieve cyber resilience, starting with Backup
Ransomware is once again fashionable for cybercriminals, and their return is driven by increasing payments. In fact, over $406 million was paid in cryptocurrency in 2020i. For businesses, it’s not just ransomware payments that impact the bottom line. Added downtime costs, reputational damage and customer distrust make it hard for businesses to fully recover.
How do businesses protect themselves from future ransomware attacks?
Join our 3-part webinar series starting August 18 to learn the 5-step framework for achieving cyber resilience with backup and protection. The experts at Carbonite + Webroot, an OpenText company, will uncover:
- The latest threat landscape, keys trends and hidden costs with ransomware
- How to leverage people, process and technology using a 5-step cyber resilience framework starting with backup
- Insights to securing and protecting data while complying with local government regulations and privacy laws -
Part 2: 5 Steps to Cyber Resilience - Train + Block
Roshan Dsouza and James Manson, Carbonite + Webroot, an Opentext company
Incorporating employees in your data protection & security processes
Phishing emails are the most common delivery method of ransomware infections. Employees are often seen as the weakest link, but did you know frontline employees can strengthen your security posture?
Businesses can reduce their threat exposure by empowering their employees to identify phishing emails. That’s why a multi-tiered approach that empowers employees to identify and report a cyber threat is so important to prevent costly mistakes and protect from costly attacks.
Join part 2 of our webinar series on September 1 to learn how you can empower employees with the knowledge they need to prevent a cyber incident through a 5-step cyber resilience framework. The experts at Carbonite + Webroot, an OpenText company, walk you through steps 2 + 3 of the cyber resilience strategy as we discuss:
• How to leverage people, process and technology with training and prevention
• Gain insights on how to empower employees to be your front-line defence by keeping them informed and vigilant
• Reduce exposure and risk through DNS protection and threat intelligence integration -
Part 3 - 5 Steps to Cyber Resilience: Protect + Restore
Alan Bull and Simon Mitrevski - Carbonite + Webroot, an Opentext Company
Data breaches impact productivity, shutting down businesses and preventing delivery of services. Additionally, human error or an IT misconfiguration in products or processes can also lead to data loss and data breaches causing significant downtime.
Watch our webcast to learn how to minimise the impact of cyberattacks and experience continuous data availability through a 5-step cyber resilience framework. The experts at Carbonite + Webroot, an OpenText company, walk you through steps 4 + 5 of the cyber resilience strategy to address:
• How to leverage people, process and technology for data protection and data restoration
• Gain continual access to data during system outages or planned/unplanned downtime
• The strategies and tools to protect against cyberattacks, human error and system failures