Execs and Directors must be
informed and involved.
|Beyond Next-Gen – Best Practices for Future-Ready Endpoint Security||"ESG and provide maximum protection for your endpoints. Hear from Enterprise Security Group, the strategic approach to endpoint security that will transcend generations and keep pace with evolving threats and the broadening attack surface area. Also, from Navicent Health's Ty Smallwood as they outline how their organization leverages Trend Micro™ XGen™ endpoint security to effectively protect against the real-world threats they face."||8 Dec 2016|
|2016 Midyear Security Roundup: The Reign of Ransomware||Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.||22 Sep 2016|
|How to keep Ransomware and other Threats out of Office 365||Learn how attacks are changing and how you can guard against advanced threats in OneDrive for Business, SharePoint Online, and email.||12 Sep 2016|
|How to Defeat Ransomware||"Ransomware is an emerging threat, no matter what industry
your organisation plays in. When it enters your organisation, you
need to be prepared to deal with it.
Learn about the latest trends in Australia being used by cybercriminals, best practices you can implement now to minimise risk and specific advanced detection capabilities available to block ransomware."
|01 Jun 2016|
|Avoid the Cost of being a Ransomware Victim||"Cyber criminals can hijack your business by encrypting your
data and holding your systems hostage until you pay up. Ransomware
can enter an organization through many vectors; including via email
spam, phishing attacks, or malicious web downloads. Like other high
sophisticated threats, organizations are recommended to employ
multiple layers of protection on the endpoint, gateway and mail
servers for the highest level of protection against ransomware.
Ransomware has become increasingly complex and advanced over time
and making prevention and protection more challenging.
Get information about Trend Micro's recommended configuration and best practices to better protect and combat ransomware!"
|14 Apr 2016|
|The Fine Line: 2016 Trend Micro Security Predictions||Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences||19 Nov 2015|
|The next step for a better customized defense||As the threat landscape continues to evolve and expand, how best can your security solution adapt to the changes? To keep up with the pace, IT security needs quick and accurate information in order to identify and remediate these incidents. The new updates for Trend Micro OfficeScan and Trend Micro Control Manager offers you just that. A better security with products working together to provide customized defense to help you rapidly adapt and respond to this ever evolving threats.||19 Aug 2015|
|Demystifying APTs and Advanced Threat Defence||Best Practices for Detecting and Mitigating Advanced Persistent Threats by GARTNER||04 Aug 2015|
|Topic||Name & Description||Location||Date ▾|