What are the top vulnerabilities used in successful ransomware attacks? They lie within the Microsoft Remote Desktop Protocol (RDP) which is widely used to provide remote users with access to in-office systems, servers and files.
Register to watch the recording featuring experts who work every day to eliminate these risks for companies large and small.
Steps you can take to minimize and eliminate vulnerabilities
How to spot the indicators that you may be vulnerable
The most common mistakes that open the door to successful attacks
Real-world examples to illustrate the recommendations
Abacode, Inc. is a Tampa, Florida based company that provides managed cybersecurity and compliance programs to businesses across all industries. He is also an adjunct professor at the University of South Florida and founder of the USF Whitehatters Computer Security Club (WCSC). Since 2000, he has taught courses in cryptography & network security, ethical hacking, digital forensics & investigations, and mobile & wireless security. For nearly 30 years, he has performed research & development of cyber solutions and built cyber services teams for government and commercial customers. Jeremy is a Certified Information Systems Security Professional and Certified Ethical Hacker. He was named 2017 Tampa Bay Technology Leader of the Year.
My goal is to provide exemplary strategic alignment of IT to maximize top-line growth, bottom-line efficiencies, and savings. Skilled at building and empowering a team of truly dedicated and highly skilled technology professionals. Progressive IT management experience specializing in full responsibility for nationwide enterprise consisting of 60 locations, two data centers, and over 1,500 users. Excellent background in strategic business operations, technical consulting, infrastructure analysis, vendor management, and contract/purchasing negations as well as hands-on project management. Proven track record for implementing transformational new products/applications/procedures to drive improved business efficiencies, end-user productivity, margins, and revenues. Skilled at creating productive work environments and motivating high-performance technical teams.