Ransomware
Ransomware is a growing cyber threat that encrypts and holds data hostage. Here, you’ll uncover expert advice and strategies for ransomware prevention, mitigation, and recovery.
Most recent
Button TextWhat's in Store for Cybersecurity in 2023
As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.

How to Boost Resilience Against Ransomware Attacks
Discover what tactics, techniques, and procedures threat actors apply in their ransomware attacks and how to take basic steps to increase cyber resilience.

Absolute Ransomware Response
Absolute Ransomware Response boosts ransomware preparedness and time-to-recovery.

New innovation in endpoint security and resilience
Live preview of new Absolute Secure Endpoint Resilience Editions and Endpoint Rehydration.

Browse All

How to Boost Resilience Against Ransomware Attacks
It’s estimated that an organization falls victim to a ransomware attack every 11 seconds. Take action to protect against this risk in the How to Boost Resilience Against Ransomware Attacks Whitepaper.

Absolute Ransomware Response Playbook
Enable a confident, efficient, and reliable response in the event of a ransomware attack.

Strengthening Security and Compliance Posture through Cyber Resilience in Government

The Third Question: What CISOs Aren't Asking, and What's at Stake

Standardize your compliance reporting and control your remote devices

7 Steps to Protecting Data in the Era of Digital Care

Insights from an Industry Analyst: The Need for Resilient, Integrated Zero Trust

K-12 Peer Advice Forum: What’s Working for IT and Security Teams

3 Immediate Actions to Save Time While Managing Online Learning

Nailing It! 5 Ways to Win with the NIST Cybersecurity Framework

3 Essential Actions to Manage and Secure Remote Devices

Endpoint Resilience As A Proactive Security Strategy

Always-on Secure Tunnel: Establish Resilient and Persistent Remote Connections

Product Briefing: Critical Steps to Secure and Manage Your Remote Workforce

Empowering Organizations to Troubleshoot in a Remote Workculture

Endpoint & Network Visibility: Ensure visibility & control, even outside of the corporate network

Self Healing: Ensure the efficacy of your most valued security applications

Ransomware Readiness: Is your organization prepared for a possible attack?

Preparing your Device Fleet for the Economic Downturn

Zero Trust Architecture: Implement & maintain a strong security posture

Leveraging Device Visibility to Boost Your IT & Security Processes

Digital Experience Monitoring: Gain actionable insight

Application Persistence: How to Secure Your Security

Absolute Ransomware Response
Absolute Ransomware Response boosts ransomware preparedness and time-to-recovery.

Healthcare Top Target Data Theft
Healthcare: Top Target for Data Theft

Absolute Security the Leader in Cyber Resilience
Discover how Absolute Security is reshaping endpoint protection and enabling businesses to build resilient infrastructures to withstand evolving cyber threats.

Going Beyond Traditional SSE
Absolute Secure Access Enterprise offers resilient SSE, endpoint compliance, and secure access to private apps, websites, and cloud, from a single console.

Survey Says UK CISO's Top Threats are Ransomware and Mobile Work
Explore key findings from the Absolute Security CISO Cyber Resilience Report 2024, highlighting concerns around cybersecurity and mobile workforce risks.

Absolute Unwraps AI Threat Insights
Get proactive AI alerts on suspicious behavior — Comprehensive alerts on user, device, network, and application behavior to detect issues before they become problems.

How to Achieve Cyber Resilience
How to build a resilient infrastructure that defends against attacks, zero day threats, and ensures fast recovery.

How to Boost Your Resilience Against the Ransomware Epidemic in Healthcare
More than 90% of all healthcare organizations reported at least one security breach over the last three years in the United States.

Cybersecurity: School’s Other Safety Concern
Secure your K-12 distance learning environment with Absolute. Combat cyber threats like phishing and ransomware with proactive security tools in 2025.

What's in Store for Cybersecurity in 2023
As 2022 enters the rearview mirror, it is time to look forward. Here is what we think will be in store for cybersecurity in 2023.

Absolute Ransomware Response: Providing an Advantage for Preparedness and Recovery
It's important for organizations to increase ransomware preparedness and assure that the tools needed for remediation, eradication, and recovery are not just in place, but also functioning as expected. Absolute Ransomware Response was developed based on extensive experience responding to and recovering endpoints from ransomware.

Ransomware – the Scourge of Our Times
Ransomware continues to pose a major threat to organisations globally. What matters is how prepared your organisation is now and how quickly it can respond and recover.

Six Steps To Effective Healthcare Data Breach Response
Effective handling of a healthcare data breach begins by acknowledging the new software-defined perimeter and the need for Zero Trust and better visibility over endpoints to improve detection and response activities.

Public Saftey
Learn how Secure Access helps over 2,500 law enforcement agencies, first responders, as well as 911 dispatch and CAD.

Federal Government
Leverage Secure Endpoint to enable a digital federal government, maintain security controls, protect sensitive public data and comply with a variety of federal data regulations.

Higher Education
Colleges and universities need to square their need for information with compliance risks and cybersecurity threats. Strike the balance with Absolute's endpoint visibility and control.

Financial
Meet internal and regulatory requirements for data security on all your devices with Absolute's powerful suite of tools.

Government
Leverage Absolute to enable a secure digital government, and increase your IT and security efficiency, accuracy and confidence. Stay compliant on all your endpoints.

K-12 Education
See, manage, control and validate appropriate usage across your entire device population — whether they're Chromebook, Windows, or Mac devices.

Healthcare
Learn how Absolute gives you the power to identify potential security threats and respond rapidly before they become security incidents that require breach notifications.

Legal
Law firms are trusted with some of their clients' most sensitive data. Protect it — and your IT assets — with Absolute's unprecedented endpoint visibility and control.

Energy Utilities
As the energy industry becomes more complex and distributed, it's more crucial than ever to see and protect all your endpoints. Learn how Absolute can help.