CF on Cyber: The Anatomy of a Ransomware Attack - Part 1

Carlton Fields
Contact
Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.

Carlton Fields Shareholder Jack Clabby joins Scott Moritz and Ron Yearwood, Senior Managing Directors at See more +

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.

Carlton Fields Shareholder Jack Clabby joins Scott Moritz and Ron Yearwood, Senior Managing Directors at FTI Consulting, to discuss best practices for preventing and mitigating ransomware. This is the first of a two-part series on FTI's Fraud Eats Strategy podcast. See less -

Embed
Copy

Other MultiMedia by Carlton Fields

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Carlton Fields

Written by:

Carlton Fields
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Carlton Fields on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide