Get Help: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
=Social Media= | =Social Media= |
Revision as of 00:18, 18 August 2023
|
A type of malware that encrypts files and demands a ransom for their release.
|
||
Social Media
Podcasts
YouTube
Linked-In Groups - COMING SOON
OTHER RESOURCES - COMING SOON
Training Resources
- Training & Awareness
- Awareness Testing
- Tool Specific Training
Cybersecurity Consultants & Service Providers
- Volunteer Cybersecurity Organizations
- Commercial Cybersecurity Consultants
- Managed Security Service Providers
Self-Service Tools & Services
- Inventory Tools
- Incident Response Simulators
- Self-Assessment Tools
Publications
- Analysis Reports
- Periodicals
- Newsletters & Blogs