VIDEO
How Cyber Extortion Works
Video Summary:
Get the inside scoop on how cyber extortion works! Learn what criminals are doing to get your data, how they can use your supply chain vendors to breach your environment, and get information on the average ransom payment in this 5-minute video. For information on what to do if you are infected with malware, download this tip sheet: https://www.lmgsecurity.com/resources/what-to-do-when-malware-strikes/. For a checklist of ways to reduce your risk of supply chain attacks, download this checklist: https://www.lmgsecurity.com/resources/supply-chain-security-checklist/
Get the inside scoop on how cyber extortion works! Learn what criminals are doing to get your data, how they can use your supply chain vendors to breach your environment, and get information on the average ransom payment in this 5-minute video. For information on what to do if you are infected with malware, download this tip sheet: https://www.lmgsecurity.com/resources/what-to-do-when-malware-strikes/. For a checklist of ways to reduce your risk of supply chain attacks, download this checklist: https://www.lmgsecurity.com/resources/supply-chain-security-checklist/