Phew – you made it!

Wipe the sweat from your brow because your first brush with ransomware is over. Of course, this was just a taster of the real thing. We hope you feel more ready for ransomware than you did before – and enjoyed taking part in the world’s first Global Cyber Crisis Exercise.

Please confirm your email address if you’d like to receive the completed benchmark research report.

If you enjoyed the Global Cyber Crisis Exercise, why not share it with your network?

Share

Raging about ransomware? Don’t miss these
resources

How the Ransomware Task Force is combating the threat

You’ve seen what ransomware can do to your business – and the threat is only growing. The Ransomware Task Force’s comprehensive framework is a vital resource in taking action against this urgent and prevalent threat.

Wicked Problems: How to navigate a crisis when there's no clear path

Cybersecurity is full of them. The "no right answer" questions that leave the best of us scratching our heads and heading for Google. The wicked problems that we wished we could deal with like Dorothy. Luckily, we're here to help. Get the low down on tackling wicked problems like a pro here. 

From scareware to cyber extortion: the many faces of ransomware

You’d be forgiven for thinking ransomware was a strictly 21st century problem. In truth, it’s been around for a while – and has gone through a fair few transformations. From scareware to cyber extortion, journey with us through the full evolution of ransomware.

What to do when you've got 99 problems – and one of them is wicked.

We’ve all got problems.

Whether at work or at home, human beings are bound to come across some stumbling blocks every now and then. There are well-defined procedures in place to fix the more common issues – call the plumber, darn the sock, visit the doctor. At work too, your office probably has an incident response plan or playbook to follow when something goes wrong. But for some problems, it’s not so simple.

Enter the wicked problem.

Read the latest blog series here

We help businesses to increase and evidence human capability in every part of cybersecurity.

Follow Us