Technology Business Review – Ransomware

by | Mar 15, 2017 | Uncategorized

Date/Time
Date – 03/29/2017
9:30 am – 10:30 am

Location
20 North Wacker – 15th Floor Gallery

Add event to your calendar
iCal

 

Monthly Technology Business Review Meetings – Last Wednesday of every month
────

Ransomware – Don’t be a victim

  • What is ransomware and tips for how to prevent it
  • Be prepared so you do not have to pay the ransom
  • How did I get infected? Someone in your company will get infected, but there are things you can do to limit the chances of this happening
  • Take your overall security seriously and worry about the details
  • Got good backups? Hope so….
  • Do you have Cyber Insurance?
  • Are your firewall, anti-virus, and other security platforms up to date?

Stop by and learn more about this month’s topic and share best practices with your building neighbors. This will be an interactive session with a business focus and the smallest amount of tech speak.

 

 

 

 

John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.

Subscribe


Related posts

Interesting Tech

Interesting Tech

                      Hushme - A muzzle you wear for those important office calls that you do not want to be overheard. Or give one to that loud guy you work with to wear… KittyKorner – Turn almost any interior door into one with a cat door. The Edge Desk – Ever...

Security – Just Deal With It Already!

Security – Just Deal With It Already!

There are way too many stories about companies that discover a security breach and then find out that the actual breach happened months or even years ago. Yikes. No one ever wants to be in that position so why not try to avoid it? Krebs on Security wrote a good...

A Dark Web Story

A Dark Web Story

I have written about the Dark Web in the past, and nothing has changed, but I did want to share a real life story. Now that we have access to the Dark Web to run reports on client data breaches, we have seen interesting results. Only once did the report come back...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This