5 Critical Tips to Protect Against Ransomware Attacks
Level up your cloud security best practices and backup strategies to keep your data safe.
WATCH ON-DEMAND BY REGISTERING BELOW.
Duration: 1 Hour
Vice President of Product Strategy, AvePoint
John HodgesVice President of Product Strategy, AvePoint
John is Vice President of Product Strategy at AvePoint, focusing on developing compliance solutions that address modern data privacy, classification, and data protection needs for organizations worldwide. John has been actively engaged in the SharePoint community for several years, working with many Fortune 500 companies to drive sustainable adoption of Microsoft technology and optimize SharePoint’s larger purpose-built implementations. John’s insights and opinions on modern Information Technology can be found in various industry publications, as well as throughout this numerous speaking sessions in webinars and at events worldwide.
Solution Engineer, AvePoint
Eric KrusiSolution Engineer, AvePoint
As a Solution Engineer, Eric provides AvePoint’s global customer base with insight and knowledge on solutions to manage and protect Office 365 data. Eric has worked in the IT field since 2008, with experience across all areas of the Microsoft and Salesforce Stacks. Eric is passionate for advising organizations on industry best practices during their digital transformation journey.
Don’t Wait Around for the Next Ransomware Attack!
Ransomware attacks happen once every 11 seconds, and there’s no indication that they’ll slow down any time soon. As your business resilience relies in part on the safety and security of your data, cyber security must remain top of mind. The business risks are even greater in this uncertain geopolitical landscape. With that in mind, why not be prepared to safeguard your data from falling into the wrong hands?
This webinar will go over actionable best practices to keep your Microsoft 365 tenant(s) secure and your data recoverable, no matter what. We’ll share real-world cases, and top tips and tricks from the trenches, to help you minimize risk and ensure a successful ransomware response.