• Tutorials
  • Courses
  • Tracks

Which method is MOST effective in defending against the Emotet‐to‐Ryuk attack chain?

Last Updated :
Discuss
Comments

Which method is MOST effective in defending against the Emotet‐to‐Ryuk attack chain?

Only endpoint antivirus installation

Opening every email attachment in a sandbox automatically

Banning all web browsing

Disabling macros in Office documents and using MFA for email access

Share your thoughts in the comments