{"id":19872,"date":"2016-10-05T13:00:51","date_gmt":"2016-10-05T20:00:51","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=19872"},"modified":"2016-10-19T14:55:35","modified_gmt":"2016-10-19T21:55:35","slug":"the-cybersecurity-download-ransomware","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/10\/the-cybersecurity-download-ransomware\/","title":{"rendered":"The Cybersecurity Download: Ransomware"},"content":{"rendered":"<p>Ransomware\u2026we know it\u2019s a threat; but what can be done to prevent it? What makes organizations a target and how do individuals fall victim to an attack? Most importantly, how can you protect yourself from ransomware?\u00a0<!--more--><\/p>\n<p>We\u2019ve rounded up several <a href=\"https:\/\/www.paloaltonetworks.com\/resources?q=*%3A*&amp;fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Finfo-insights&amp;%3Acq_csrf_token=undefined\" target=\"_blank\">Info &amp; Insights<\/a> resources to give you the download on ransomware and what should be done to prevent it.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/what-is-ransomware\" target=\"_blank\">What Is Ransomware?<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/research\/ransomware-report\" target=\"_blank\">Ransomware: Unlocking the Lucrative Criminal Business Model<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/ransomware-common-attack-methods\" target=\"_blank\">Ransomware: Common Attack Methods<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/info-insights\/preventing-ransomware-what-your-security-architecture-must-do\" target=\"_blank\">Preventing Ransomware: What Your Security Architecture Must Do<\/a><\/li>\n<\/ul>\n<p>Be sure to check out <a href=\"https:\/\/www.paloaltonetworks.com\/resources?q=*%3A*&amp;fq=RC_TYPE_DFACET%3Apan%253Aresource-center%252Frc-type%252Finfo-insights&amp;%3Acq_csrf_token=undefined\" target=\"_blank\">Info &amp; Insights<\/a> for more educational assets on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware\u2026we know it\u2019s a threat; but what can be done to prevent it? What makes organizations a target and how do individuals fall victim to an attack? Most importantly, how can you &hellip;<\/p>\n","protected":false},"author":226,"featured_media":20592,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,108],"tags":[2859,2521,221],"coauthors":[2416],"class_list":["post-19872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-2","category-threat-prevention-2","tag-cybersecurity-download","tag-info-insights","tag-ransomware"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/10\/blog-generic-banner.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=19872"}],"version-history":[{"count":1,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19872\/revisions"}],"predecessor-version":[{"id":19875,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19872\/revisions\/19875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/20592"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=19872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=19872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=19872"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=19872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}