Ransomware : Steps to Protect Yourself

Ransomware : Steps to Protect Yourself

“There are two types of organizations now: those who have been breached and those who have been breached but [don’t] know it yet. ” From a survey conducted with 1,263 companies, 80% of victims who submitted a ransom payment experienced another attack soon after, and 46% got access to their data but most of it was corrupted. (Cybereason, 2021)

“There are two types of organizations now: those who have been breached and those who have been breached but [don’t] know it yet. ”

From a survey conducted with 1,263 companies, 80% of victims who submitted a ransom payment experienced another attack soon after, and 46% got access to their data but most of it was corrupted. (Cybereason, 2021)

Additionally, 60% of survey respondents experienced revenue loss and 53% stated their brands were damaged as a result. (Cybereason, 2021)

Ransomware was again recently ranked as the most prominent cyber threat.  97% of organizations were breached according to one study with average damages exceeding $ 500,000.00.  The following resources are provided to help you not be a victim.

Understanding the Attack

Ransomware is a form of malicious software that infiltrates a computer or network and limits or restricts access to critical data by encrypting files until a ransom is paid.

Fast Facts

  1. Most prominent threat
  2. Malicious emails are up 600% due to COVID-19
  3. Cost : 2021 = $200k average infection cost (up from 2018 = $5k )
  4. Every 11 seconds a new victim is infected
  5. 29% of organizations infected are forced to remove jobs

Steps to Protect Yourself

  1. Understand Risks and Business Impact
  2. Use Cloud-Native secure eMail
  3. Use 2 Factor Authentication for all users
    Free from Microsoft, Google
  4. Backups daily  – the life raft when it happens
  5. Update the latest browser & enable Safe Browsing
  6. AntiVirus
  7. Use Complex Passwords
  8. Update all devices & Keep current
  9. Do not allow the download of free software or drivers
  10. Review Cyber Insurance Coverage
  11. Start cyber awareness training (free)
  12. Incident Response and Notification Policy

Additional Resources

Newsweek : Your Money or Your Data: Ransomware Viruses Reach Epidemic Proportions

The iLLÜM Advisors team has hundreds of combined years of helping organizations’ existing IT teams deliver value to business stakeholders and customers by aligning activities to business goals

Looking for business IT transformation?

Schedule a 20 minute call and let’s get started.

Related Solutions

Cyber Incident – Response and Planning

Cyber Incident – Response and Planning

See How We Do It

IT Risk Management

IT Risk Management

See How We Do It

Unified IT Management Platform

Unified IT Management Platform

See How We Do It

Virtual IT Executive – vCIO and vCISO

Virtual IT Executive – vCIO and vCISO

See How We Do It

Technology Acquisition / IT Vendor Management

Technology Acquisition / IT Vendor Management

See How We Do It

Program and Project Management

Program and Project Management

See How We Do It

ITSM Service Desk (HelpDesk)

ITSM Service Desk (HelpDesk)

See How We Do It

IT Transformation

IT Transformation

See How We Do It

Vulnerability Management

Vulnerability Management

See How We Do It

IT Enablement and Delivery

IT Enablement and Delivery

See How We Do It

Digital Transformation

Digital Transformation

See How We Do It

Cyber Incident Response

Cyber Incident Response

See How We Do It

Business Intelligence – Data and Analytics

Business Intelligence – Data and Analytics

See How We Do It

Business Challenges 2.2 – Program and Project Management

Business Challenges 2.2 – Program and Project Management

See How We Do It

Related Solutions

Solution Name Will
Go Here

Solution Name Will
Go Here

See How We Do It

Solution Name Will
Go Here

Solution Name Will
Go Here

See How We Do It

Solution Name Will
Go Here

Solution Name Will
Go Here

See How We Do It