GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Ransomware Content

Ransomware Guide

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in…

Learn More

Stop Ransomware

Varonis detects ransomware on your core IT systems: file servers, NAS and the cloud, where terabytes of your most critical data lives, and stops the attack in its tracks. Our…

Learn More

The State of Ransomware 2020

Stories of organizations crippled by ransomware regularly dominate the IT news headlines, and accounts of six- and seven-figure ransom demands are commonplace. But do the news stories tell the full…

Learn More

Preparing Your Organization For Ransomware Attacks

What do you do if your computer suddenly displays a countdown clock and a message telling you that your files have been encrypted and will be permanently lost to you…

Learn More

Tips & Tactics on Ransomware

Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks…

Learn More

Ransomware: What It Is & What To Do About It

A National Cyber Investigative Joint Task Force (NCIJTF) joint-seal ransomware fact sheet provides the public important information on the current ransomware threat and the government’s response, as well common infection…

Learn More

Security Primer – Ryuk

Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number one reported variant of 2019, accounting for approximately a…

Learn More

5 Ransomware Trends to Watch in 2020

This is the fourth year that Recorded Future has asked me to write up my predictions for where ransomware is headed in the coming year. Trying to predict the future…

Learn More

Breaking the Ransomware Cycle: U.S. National...

Holding objects of value hostage until a ransom is paid for their release is an ancient vice, but it has acquired special salience in the digital age, as cyber criminals…

Learn More

Data Integrity: Detecting and Responding to...

Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files,…

Learn More

Protecting Data from Ransomware and Other Data...

The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) developed this publication to help managed service providers (MSPs) improve their cybersecurity and the…

Learn More

Cybersecurity for Small Business

Someone in your company gets an email. It looks legitimate, but with one click on a link, or one download of an attachment, everyone is locked out of your network.…

Learn More

CylancePROTECT® Continuous Threat Prevention...

For years, endpoint security products’ primary threat protection was based on signatures, created after patient zeros were impacted and the damage already done. Assuming all attacks had been seen before,…

Learn More

Ransoming Government: What State and Local...

In December 1989, computer researcher Jim Bates popped a floppy disk into the disk drive and was shocked at what he saw. On a disk labeled “AIDS Information Version 2.0,”…

Learn More

The Value of Threat Intelligence

Cyber security is an ongoing battle between sophisticated and well-funded bad actors and those who must defend corporate networks against their attacks. The bad news is that the latter are…

Learn More