Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cloudian Ransomware Survey Finds 65% Of Victims Penetrated By Phishing Had Conducted Anti-Phishing Training

Failure of Traditional Defenses in Preventing Attacks Highlights Need for Greater Focus on Being Able to Recover Quickly Without Paying Ransom

Cloudian issued its 2021 Ransomware Victims Report, based on an independent survey of 200 IT decision makers whose organizations experienced a ransomware attack between 2019 and 2021. The survey found that traditional ransomware defenses are failing, with 54% of all victims having anti-phishing training and 49% having perimeter defenses in place at the time of attack. Citing this and other findings from the survey—including the widespread impact of the attacks and the average financial costs totaling over $400,000—the report calls for organizations to focus greater attention on putting systems in place that enable quick data recovery in the event of an attack, without paying ransom.

Recommended AI News: Lightbeam’s New Payer Solutions Enhance Payer-Provider Alignment

Despite Defensive Measures, Ransomware Gets In
Many organizations spend large portions of their cybersecurity budget on defensive measures such as anti-malware software and anti-phishing training for employees. Despite these efforts, however, ransomware attacks have become increasingly sophisticated, enabling cybercriminals to penetrate the defenses. The survey found that:

  • Phishing continues to be one of the easiest paths for ransomware, with 24% of ransomware attacks starting this way.
  • Phishing succeeded despite the fact that 54% of all respondents and 65% of those that reported it as the entry point had conducted anti-phishing training for employees.
  • 49% of respondents had perimeter defenses in place prior to the successful attack.
  • Public cloud was the most common point of entry for ransomware, with 31% of respondents being attacked this way.

Attackers Move Fast and the Impact is Widespread
Once cybercriminals are able to insert ransomware, they can quickly take over and significantly impact all aspects of an organization:

Related Posts
1 of 40,647
  • 56% of survey respondents reported that attackers were able to take control of their data and demand ransom within just 12 hours, and another 30% said it happened within 24 hours.
  • More than half of those surveyed said the attacks significantly impacted their financials, operations, employees, customers and reputation.

Recommended AI News: Inspirage Recognized for Delivering Customer Success with Oracle Cloud

The Financial Costs Go Beyond Just Ransom Payments
Ransom payments are significant and rising, but they’re not the only costs of an attack. For the 55% of respondents that chose to pay the ransom:

  • The average ransom payment was $223,000, with 14% paying $500,000 or more.
  • They spent an average of $183,000 more for other costs resulting from the attack.
  • Cyber insurance covered only about 60% of the ransomware payment and other costs, presumably reflecting deductibles and coverage caps.
  • Despite paying ransom, only 57% of respondents got all their data back.

“The threat of ransomware will continue to plague organizations around the world if they do not change their approach and response to it,” said Jon Toor, chief marketing officer at Cloudian. “Cyberattacks can penetrate even the most robust defenses, so it’s critical that organizations prioritize being able to recover quickly from an attack.

“The best way to do so is to have an immutable backup copy of your data, which prevents hackers from encrypting or deleting the data for a specified period of time. As a result, organizations can recover an unencrypted copy of their data in the event of an attack without having to pay the ransom.”

Recommended AI News: REPAY Expands Acumatica Functionality to Offer Accounts Payable Automation

Comments are closed.