Attackers use phishing emails or vulnerabilities in software to gain control of computer systems, steal or encrypt sensitive information to blackmail companies.
Often, forensics then comes into sharp focus after an attack. What happened, how did it happen, what data was stolen or how far did the attacker get before the attack was detected? But would I be happy if a burglar was disturbed at my home and "only" half the house was devastated or "only a few" valuable things were missing? Certainly not. A burglary should not be possible in the first place.
Prevention is the keyword. Shutters, locks, fences, cameras and motion detectors are suitable measures for your own home.
In this short presentation, Falk Trümner uses practical examples to show which measures make the most sense and are the most effective for your end devices in the company.