Defeating Ransomware

Strike Back Against Encrypting Ransomware

CryptoLocker ransom noteEver since CryptoLocker first appeared, in 2013, encrypting ransomware has become the most common (and most profitable) form of malware yet created. There are more than 200 "families" of ransomware, and each family may have from one to hundreds of variants. By the most conservative estimates, there are now thousands of different versions of encrypting ransomware "in the wild."

Unlike other, "traditional" malware, the technician is faced with two separate issues when dealing with one of these infections:

  • Removing the malware
  • Recovering the encrypted files

If the technician doesn't deal with the infection in the appropriate way, and in the correct sequence, he/she may lose the ability to recover the encrypted files. Most technicians don't understand how these two objectives are related, and the harm they can do if they don't approach the cleanup in the proper way.

This recorded, one-hour mini-course covers everything the tech needs to know in order to deal effectively with this type of infection. It includes step-by-step instructions to follow in order to have the best chance of removing the malware and recovering the data files it has encrypted.

Sadly, in some cases the data cannot be recovered unless the user has unencrypted backups. If that's the case with the particular variant you're dealing with, you don't want to waste the client's money by paying the ransom.

Following the malware removal and data recovery procedure, this mini-course explains how the computer could have become infected and concludes with a checklist of preventive measures you can put in place to reduce the likelihood of future encrypting ransomware infections (or any other form of malware) on any computer. And most importantly, a reminder of the importance of backups for every computer user!

For a low, one-time fee, you receive these deliverables:

  • Replay of the full presentation, with unlimited views by one individual for 60 days from purchase date
  • Accompanying .pdf document, with "live" hyperlinks to download the additional software and other resources referenced in the presentation
  • Direct access to The Virus Doctor via e-mail for 30 days for help with ransomware-related issues and questions
  • Access to later versions of the mini-course produced within 60 days of purchase

Additionally, if you decide within 90 days of purchase to register for the full Virus Remediation Training workshop, you will receive full credit for this mini-course toward the VRT tuition.