In this episode Adam and Peter discuss using the “Whitelist”. What does your computer and a nightclub have in common? You can’t get in if you are not on this list.
10 Critical Steps to Survive a Ransomware Attack, Step 9: Allow Only Whitelisted Applications
Podcast: Play in new window | Download