Create a Disaster-Ready Ransomware Recovery Plan

Organizations don’t always integrate their incident response and disaster recovery plans, which creates gaps in their response strategy to ransomware – this can...
  • guided implementation icon

Create a Disaster-Ready Ransomware Recovery Plan – Executive Brief

Read this Executive Brief to understand why you need to coordinate incident management and disaster recovery as part of your overall ransomware recovery plan.

Create a Disaster-Ready Ransomware Recovery Plan – Phases 1-4

Use this blueprint to coordinate your incident management and disaster recovery programs to plan for and mitigate the impact of ransomware.

Create a Disaster-Ready Ransomware Recovery Plan – Phase 1: Assess Your Ransomware Readiness

This phase of the blueprint will help you assess your overall ransomware response readiness.

Ransomware Incident Management Maturity Assessment Tool

Use the Ransomware Incident Management Maturity Assessment Tool to define your current and target state, create gap initiatives to close the gap, and prioritize...

Create a Disaster-Ready Ransomware Recovery Plan – Phase 2: Determine Business Impact to Understand Acceptable RTOs and RPOs

This phase of the blueprint will help you determine the overall business impact of a ransomware incident.

Citrix Systems Remain Vulnerable Despite Patching Attempts

A Citrix vulnerability first discovered on December 17, 2019 is being continually exploited by ransomware attackers despite patching attempts by Citrix.

Project Zero Extends Its Vulnerability Disclosure Agreement to 90 Days, Changes to Follow

Project Zero is changing its vulnerability disclosure policy to give software developers more time to patch vulnerabilities. The policy is now shifted to a stringent...

Bishop Fox Discovers Eight Vulnerabilities in ConnectWise: Patching a Managed Service Provider

Cybersecurity firm Bishop Fox identified eight vulnerabilities in ConnectWise’s remote control and remote access software.

Palo Alto Networks Acquires Cloud-Based Company Aporeto

Palo Alto Networks has acquired Aporeto, a machine-identity-based microsegmentation company, for $150 million. As Palo Alto seeks to solidify itself as a cloud-centric...
GET HELP Contact Us
×
VL Methodology