Cyber SecurityNews

New US survey highlights impact of ransomware attacks

Nearly two-thirds (64%) of organisations said they had been victims of ransomware attacks in the past 12 months, according to a new report which also found 4 in 5 victims (83%) felt they had no choice but to pay the ransom.

The survey, carried out by cyber security company ThycoticCentrify, features insights from 300 US-based IT decision makers.

It found that half of respondents said they had experienced loss of revenue and reputational damage following a ransomware attack, with 42% indicating they had lost customers.

The report highlights how organizations are responding to the growing threats from ransomware attacks, including:

  • 72% have seen cybersecurity budgets increase due to ransomware threats
  • 93% are allocating special budget to fight ransomware threats
  • 50% said they experienced loss of revenue and reputational damage from an attack
  • 42% indicated they had lost customers as a result of an attack

“Our research shows ransomware is a threat to organizations of all sizes and levels of sophistication,” said Art Gilliland, CEO at ThycoticCentrify. “The first line of defense should be solutions that secure privileged access, including multi-factor authentication (MFA) and other methods of enforcing Zero Trust, to keep would-be cyber criminals contained and limit the damage they can inflict.”

The report features three main takeaways with recommendations and resources to help mitigate damage from an attack.

  1. With so many organizations victimized by ransomware attacks, it is more important than ever that organizations prioritize creating an incident response plan to avoid being added to the growing list that have paid the ransom demand.
  2. While increasing cybersecurity budgets for network and cloud security solutions, organizations must also understand and prioritize the requirements for preventing exploit escalation with PAM security that enforces least privileged access.
  3. Preventing ransomware attacks by practicing basic cybersecurity hygiene such as regular backups, timely patching, MFA, and password protection is essential. However, PAM policies that make least privileged access a priority enable security teams to identify the attack entry point, understand what happened, help remediate, and ultimately protect restored data.

Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.