Digital Spring Cleaning: Friendly Reminders on How to Protect and Mitigate your Environment from Malware




Taste of Premier   (Audio) - Channel 9 show

Summary: The sun is out (hopefully where you are!) which means it must be time for some spring cleaning (unless you live in the southern hemisphere where’s its actually fall…but I’m sure you get where I’m going here) and there’s no better way for us techies is to do some spring cleaning than digital spring cleaning! Join Lex Thomas as he welcomes back Jessica Payne to the show as they discuss the latest cyber attack techniques and what you can do to protect your digital world. [0:50] What’s the latest trends on cyber attacks and ransomware?[7:52] What is Samas and how is this different than other ransomware attacks?[10:50] How can our audience be better prepared for cyber security attacks?[22:54] Give us your Top 5 tips for protecting yourself against malware.Need more info? Check out Microsoft.com/Security Send your comments or questions to the "Taste of Premier" Podcast show! Follow the conversation @TasteofPremier Become a Fan @ Facebook.com/PremierSupport Subscribe to our podcast via iTunes, Windows Phone Podcast Marketplace or RSS __________________________ Experience Microsoft's latest products with these FREE downloads! Build Your Lab! Download Windows Server 2012, System Center 2012 and Hyper-V Server 2012 and get the best virtualization platform and private cloud management solution on the market. Try it FREE now! Don't Have a Lab? Build Your Lab in the Cloud with Microsoft Azure Virtual Machines. Try Windows Azure for free with no cost or obligations, and use any OS, language, database or tool. FREE Download __________________________ Websites & Blogs: Microsoft Services Premier SupportMicrosoft CybersecurityMMPC Blog post on Samas (the targeted ransomware)MMPC Blog post on Locky, which includes how to disable macrosPass the Hash and Stopping Credential Theft WhitepapersPrivileged Admin Workstations guidanceVideos: How to Mitigate Pass-the-Hash and Other Forms of Credential TheftSecuring your Desktop: How a Threat Becomes a Security PatchMicro