This resource is no longer available

Ransomware Response Guide

Cover

As of 2016, there are numerous different ransomware variants flying around the internet. Some are very efficient and at rendering files inaccessible unless a ransom is paid, while others implement the encryption process poorly.

Ransomware is commonly received by a victim through unsolicited email from an unknown sender as an attachment or injected into a user’s browser session through a web browser vulnerability.

The document is intended to be a guide for organizations faced with a ransomware infection. If you are currently experiencing a ransomware incident, it is recommended you review this guide immediately.

Vendor:
IBM
Posted:
26 Jul 2016
Published:
01 May 2016
Format:
PDF
Type:
White Paper
Language:
English

This resource is no longer available.