Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog. This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.
While some organizations are waking up to the fact the ransomware attacks are in fact data breaches, unless perhaps data exfiltration technology can prove otherwise, many are still opting to sweep the attack under the carpet.
Ransomware cyberattacks are a big business, so big in fact, that research anticipates a business is attacked by a cybercriminal every 11 seconds and damage costs from these attacks will hit around $20 billion by 2021. In 2020, we’ll be tracking the publicized ransomware cyberattacks each month and sharing them with you via this blog. [...]
In addition to the dramatic rise in ransomware during 2020, many organizations face an even more imminent danger, the insider threat. Leading analyst firm Forrester expects insiders to be responsible for a third of breaches in 2021, up 8% from 2020, mostly due to the increase in remote working.
If 2020 has taught IT security leaders anything, it’s that remote workers are more vulnerable to cyberattacks and ransomware, and the tools that they thought would protect them outside the walls of the corporate environment simply didn’t in many cases.
The threat of data loss, data breaches and ransomware is on the minds of everyone. We discuss the crucial part that data exfiltration plays in defending an organization from these modern threats.
Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting.
Cybercriminals are increasingly targeting healthcare organizations. As cybercriminals continue to outpace the security technology and processes in the healthcare sector, what can IT leaders do to prevent modern-day cyberattacks?
Everything you need to know about ransomware: what is ransomware, different types of ransomware, how does it spread, impact, and how to protect against it.
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.