#ThreatDigest: Stop Making These Initial Access Mistakes

Protecting People - A podcast by Proofpoint

Categories:

Gone are the days of 2016 when we saw 12 million ransomware attachments randomly blasted out per day. It’s 2021 now, when threat actors selectively deploy ransomware against high value targets across the victim organization’s entire network in order to secure initial access.Why is initial access so often overlooked in protecting against the multiplicity of ransomware threats?In the inaugural episode of our Threat Digest series, series hosts Selena Larson and Crista Giering, Senior Threat Intelligence Analysts at Proofpoint, interview Daniel Blackford, Senior Threat Researcher at Proofpoint, about initial access and what can happen afterwards. Join us as we discuss:The evolution of ecrime in the past five yearsInitial access, dwell time, and the prevalence of Cobalt Strike activityWhat white glove ransomware treatment is likeTips for protecting your org against multiple malign actors at various stages of an attackCheck out the report we mentioned during the podcast:-The First Step: Initial Access Leads to Ransomware  For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.

Visit the podcast's native language site