Ransomware Reputation
By |Published On: August 4th, 2020|2 min read|Categories: Breach, Ransomware|

Don’t be lulled into a false sense of security by your existing cybersecurity tools. Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting. Perhaps the most significant of all is the loss of business through reputational damage that can take years to repair.

Information technologies services giant Cognizant provides a sobering example of what can happen. The company who is one of the largest IT Managed Service Providers in the world, saw their revenues decline from $509 million to $360 million in less than one quarter after the attack, even while industry revenues were still soaring.

It certainly doesn’t help that this company was in the industry of advising other companies about how to protect themselves. More recently, a subsidiary of DXC Technology, a large global MSP provider, announced that they also suffered a ransomware attack that took services offline for several hours.

Ransomware is increasingly targeting MSPs and IT service providers who often find themselves caught off guard while using traditional cybersecurity solutions that focus on the fortress approach, building moats, walls and sentries around their assets.

The Fortress Approach

This approach is becoming less effective every day. Corporate assets are no longer stationary, but constantly moving targets, in airports, in cafes, in homes, wherever people choose to work, especially in the days of COVID 19.

BlackFog Cybersecurity Banner

BlackFog takes a different approach. It assumes cybercriminals are already in (typically infected at remote locations and laterally spread through the corporate network, or even insider threats). Organizations are so busy fortifying the building, they do not consider that the threats are already in place, exfiltrating data outside the network.

Advanced persistent threats (APT’s), often remain latent for months before activating and are very difficult to detect with existing technology. BlackFog focuses on both Privacy and Data Security. By watching traffic leave the device it can determine (based on behavioral patterns) when something unusual is happening and can prevent it in real time.

As is often the case in life, it is not always about what is happening right in front of you that’s important, but what’s happening behind you.

Share This Story, Choose Your Platform!

Related Posts

  • Big Game Hunting Rise

Big Game Hunting is on the Rise in Cybercrime

October 9th, 2024|

Big game hunting in cybercrime refers to attacks where cybercriminals target large organizations with the goal of demanding hefty ransoms. This article explores the tactics used in these attacks, provides real-world examples, and explains why this form of cybercrime is becoming increasingly common.

  • How ADX is implemented by BlackFog

TAG Blog Series 3 – How ADX is Integrated by BlackFog

September 30th, 2024|

Integrating Anti Data Exfiltration (ADX) solutions is essential for enterprise cybersecurity. This article examines how BlackFog's ADX enhances existing technologies by focusing on prevention and the shift-left paradigm. It illustrates ADX's effectiveness against ransomware and its support for modern managed security service providers, demonstrating how ADX integration creates a comprehensive security solution.

  • Data Exfiltration Extortion

Data Exfiltration Extortion Now Averages $5.21 Million According to IBM’s Report

September 23rd, 2024|

According to IBM's 2024 Data Breach Report, the financial toll of data exfiltration extortion has surged, with the average cost now reaching $5.21 million per incident. This alarming trend highlights the growing sophistication of cybercriminals and the increasing financial risks organizations face when sensitive data is compromised. As data breaches continue to escalate, businesses must prioritize robust cybersecurity measures to mitigate these costly threats.