Тёмный

What is Ransomware? 

IBM Technology
Подписаться 803 тыс.
Просмотров 46 тыс.
50% 1

► Check out the IBM X-Force Threat Intelligence Index Report → ibm.biz/cyber-threat-intellige...
Learn more about Ransomware → ibm.biz/learn-about-ransomware
Learn more about Cloud Security → ibm.biz/cloud-security-complet...
Check out IBM Security solutions → ibm.biz/ibm-security
You've probably heard the term ransomware used recently in the news. Between the Colonial Pipeline attack, attacks against local governments, school systems, etc., ransomware is everywhere in the news these days.
But what is ransomware? How does it work? How can you protect yourself from it?
In this lightboard video, Bradley Knapp with IBM Cloud, answer these questions and much more as he explains how ransomware can affect both your personal local machine, as well as a large enterprise, and what you can do to defense yourself against malicious attacks.
Get started on IBM Cloud at no cost → ibm.biz/start-your-free-tier-acct
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#Ransomware #Malware #CloudSecurity

Наука

Опубликовано:

 

2 сен 2021

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 34   
@tannerschumacher9269
@tannerschumacher9269 2 года назад
Brad's speaking style really makes these subjects easy to listen to. Every one of his videos I thoroughly look forward to.
@umasivasangaran
@umasivasangaran Год назад
Thank you for sharing and appreciate your flow and effort on posting this great content. I encourage you to keep posting IT related videos more.
@PranavBhattarai
@PranavBhattarai 2 года назад
Wow. Amazing flow and confidence. Loved it. I want IBM Cloud to make more videos and ignore the view counts. Sending my love from Nepal.
@IBMTechnology
@IBMTechnology 2 года назад
Thank you for the great feedback, Pranav! 🙏 We will certainly keep doing more videos like this, be sure to stay subscribed!
@EngineeringChampion
@EngineeringChampion 2 года назад
I enjoyed this video! Thank you!
@9411841905
@9411841905 2 года назад
Thanks, you have explained it well.
@r4jjin
@r4jjin 2 года назад
Nice explanation 👍
@maddieg5759
@maddieg5759 2 года назад
This the best vedio for introduction on Ransomware !! Thank you 😊
@IBMTechnology
@IBMTechnology 2 года назад
Thanks for the appreciation, Maddie, and you're welcome! 😀
@nhlanngwe1
@nhlanngwe1 Год назад
great explanation .thank you!
@arislopez411
@arislopez411 2 года назад
Excellent
@garethjohn8931
@garethjohn8931 2 года назад
I take it the Under armour logo is on your left side? Either that or you're amazing at writing backwards.
@davidanam7509
@davidanam7509 2 года назад
What do you do when the company does not want to spend on backups?
@evolvemga
@evolvemga 2 года назад
This is great! Anyone who is looking for more info on ransomware should check the video out
@IBMTechnology
@IBMTechnology 2 года назад
Thanks for the appreciation! 👍
@jeandy4495
@jeandy4495 Год назад
I'm surprised that he did not speak about the human dimension. In a company, workers may open emails and download attachments which contain malicious code. For example an Excel file with macros. In this case scenario, the machine is not the problem, but the user.
@omaralaadin3927
@omaralaadin3927 2 года назад
Wow, Great... Is there a way or a pattern on which, the victim could know which Backup is prior to the Vulnerability Injection?
@bradleyknapp2909
@bradleyknapp2909 2 года назад
Omar, unfortunately, you need to do a manual examination of your backups after determining the kind/type of malware to determine if a backup is clean before restoring it. That said, the most important step (after confirming a clean backup) is making sure that the machine you are restoring is OFFLINE and the vulnerabilities that allowed for the installation of the malware are patched before bringing the machine back fully online and restoring to production use.
@dhanushkohlinagaraj5176
@dhanushkohlinagaraj5176 2 года назад
@@bradleyknapp2909 great!!
@elmarius77
@elmarius77 Год назад
Yes, using Cybersense (full content analytics) in a Cyber Recovery Vault.
@RushikeshJoshi8
@RushikeshJoshi8 2 года назад
In today's increasingly online world advancements also mean more vulnerabilities and loopholes to exploit, which makes it easier for malicious software to take control of the systems running older versions of the software or OS, thank you IBM for educating everyone about this as this can have severe consequences if left unchecked, kudos!!
@John-rambo84
@John-rambo84 2 года назад
Uuuuu77777
@irfankhan-hd6it
@irfankhan-hd6it 2 года назад
how to recover the encrypted files by "woit"
@Njs1211
@Njs1211 Год назад
How to check if my backup already have Ransomeware?
@jeandy4495
@jeandy4495 Год назад
This is hard to tell. You kind of have to check manually through all the files if you don't have weird ones or if weird processes are running. You'd notice if your backup has the ransomware if after some time, your system gets encrypted again.
@user-xs1ju7ly5s
@user-xs1ju7ly5s 2 года назад
Хорошо рассказал. Спасибо
@berserkerwolf7674
@berserkerwolf7674 2 года назад
I got hit with ransomware last week. I logged on to my FB, but its locked. Can ransomware hack my social media accounts?
@jeandy4495
@jeandy4495 Год назад
As the hacker has access to your computer, he may execute and do whatever he wants, including accessing your accounts if the credentials were saved. But this is not the goal of a ransomware.
@mikeh7476
@mikeh7476 2 года назад
How is this guy writing backwards tho
@horsepower523
@horsepower523 Год назад
Ah yes, that's the real question isn't it lol
@jeandy4495
@jeandy4495 Год назад
Hope it's not disappointing, but he actually writes normally and they mirror the image in post-prod
@sharky9493
@sharky9493 Год назад
Don´t use Windows 95, use XP. and you are safe!!!😂
Далее
IaaS Explained
8:07
Просмотров 172 тыс.
What is a Virtual Server?
7:07
Просмотров 61 тыс.
What is Ransomware?
4:12
Просмотров 29 тыс.
How Paris Pulled Off One Of The Cheapest Olympics
12:25
Can we dooby Tesco's GU10 bulbs?  - with schematic
10:41
NAT and Firewall Explained
9:24
Просмотров 99 тыс.
Denial of Service Attacks Explained
9:52
Просмотров 54 тыс.
Containers vs VMs: What's the difference?
8:08
Просмотров 749 тыс.
АЙФОН Г0ВН0
0:54
Просмотров 1,3 млн