Appearing as an expert for more than a decade, you know the author from
The Pocket Guide for InvestigatingRansomware and Network Intrusions
This book was written to assist you in understanding the technical, logistical and legal processes involved with these investigations.
There are many goals and objectives covered in this book, which must be completed successfully to address the legal and technical aspects of the project. For example, there may be legal compliance issues if you find personally identifiable information (PII) on one or more computers that an intruder accessed. My hope is that this book serves as a guide to keep you and your team focused and organized, and help you successfully complete the mission.
Who should read this book?
As a law firm, it is essential that you safeguard clients’ data.
Overcome challenges to secure all of your endpoints and mitigate cyber threats
Learn how not to fall prey to cybercrime & digital extortionists.
Data Security Technicians
Keep yourself, and your organization, abreast of the latest cybercrime threats.
To protect your network from a ransomware attack, it's critical that you have a detailed plan.
Learn best practices for configuring your firewall and network to give you the best protection possible.