{"id":19925,"date":"2016-09-21T09:37:14","date_gmt":"2016-09-21T15:37:14","guid":{"rendered":"https://www.webroot.com/blog/?p=19925"},"modified":"2018-01-30T12:35:47","modified_gmt":"2018-01-30T19:35:47","slug":"protecting-against-emerging-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/09\/21\/protecting-against-emerging-ransomware\/","title":{"rendered":"Protecting Against Emerging Ransomware"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>While ransomware has become a buzzword for some, cyber criminals have made it a lucrative business and one which they are constantly evolving. Each day, the Webroot BrightCloud\u00ae Threat Intelligence Platform monitors, classifies and scores 95% of the internet to discover 6,000 phishing sites and 80,000 variants of malware and PUAs.<\/p>\n<p>According to Webroot\u2019s latest research, more than 97% of threats are unique to a single endpoint making traditional signature-based antivirus underprepared and ineffective in protecting businesses against today\u2019s threat landscape.\u00a0In this podcast, Tyler Moffitt, Senior Threat Research Analyst for Webroot, joins Ryan Morris, contributing editor for Penton Technology, to explain the newest and most challenging forms of ransomware, such as malvertising. In addition, they dive into the latest threat trends and arm MSPs with tested and actionable suggestions to help protect themselves and their customers from becoming another statistic.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Penton Technology Podcast with Tyler Moffitt &#8211;\u00a0Ransomware &#8211;\u00a0Part 1<\/strong><\/h5>\n<!--[if lt IE 9]><script>document.createElement('audio');<\/script><![endif]-->\n<audio class=\"wp-audio-shortcode\" id=\"audio-19925-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part1.mp3?_=1\" \/><a href=\"\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part1.mp3\">\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part1.mp3<\/a><\/audio>\n<h5><strong><br \/>\nPenton Technology Podcast with Tyler Moffitt &#8211; Ransomware &#8211; Part 2<\/strong><\/h5>\n<audio class=\"wp-audio-shortcode\" id=\"audio-19925-2\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part2.mp3?_=2\" \/><a href=\"\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part2.mp3\">\/blog\/wp-content\/uploads\/2016\/09\/Tyler_Part2.mp3<\/a><\/audio>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; While ransomware has become a buzzword for some, cyber criminals have made it a lucrative business and one which they are constantly evolving. Each day, the Webroot BrightCloud\u00ae Threat Intelligence Platform monitors, classifies and scores 95% of the internet to discover 6,000 phishing sites and 80,000 variants of malware and PUAs. According to Webroot\u2019s [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":19953,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4037,20119,20113,20107,20097,20123,20115,20105,20101,3937,20121,20117,20103,20099,3569,19387,20111,20109,3471,3525],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19925"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=19925"}],"version-history":[{"count":12,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19925\/revisions"}],"predecessor-version":[{"id":19955,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/19925\/revisions\/19955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/19953"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=19925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=19925"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=19925"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=19925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}