SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Ransomware	has	quickly	emerged	as	one	of	the	most	dangerous	cyberthreats	facing	both	organizations	and	consumers,
with	global	losses	now	likely	running	to	hundreds	of	millions	of	dollars.	Adopting	the	Veritas	multilayered	strategy	approach
to	security	minimizes	the	chance	of	infection.
71%
of	organizations	targeted	by
ransomware	end	up	infected.
209
Paid	to	ransomware
criminals	in	Q1	2016
United	State 28 Other	Regions 19
Canada 16 Australia 11
India 9 Japan 4
Italy 4 United	Kingdom 3
Germany 2 Netherlands 2
Malaysia 2
Services 38 Manufacturing 17
Public
Administration
10 Finance,
Insurance,	&
Real	Estate
10
Wholesale	Trade 9 Transportation,
Communications,
&	Utilities
7
Retail	Trade 4 Construction 4
Mining 1 Agriculture,
Forestry,	&	Fishing
1
PLATFORMS
AFFECTED	BY
RANSOMWARE
Victims	need	to	be	aware	that	paying	the	ransom	does	NOT	always	work.
Attackers	may	not	send	a	decryption	key,	could	poorly	implement	the
decryption	process	and	damage	files,	and	may	deliver	a	larger	ransom
demand	after	receiving	the	initial	payment.
Make	sure	employees	are
aware	of	ransomware	and	of
their	critical	roles	in	protecting
the	organization’s	data.
RANSOMWARE
INFECTIONS	ARE	DUE	
TO	EMAILS	WITH
MALICIOUS	LINKS	&
ATTACHMENTS
$679
million
That's	more	than	167	times	the	number	of	attacks	in	2015!
Source:	CNN
Source:	Symantec
Source:	Symantec
Source:	Osterman	Research
https://blog.barkly.com/ransomware-statistics-2016
https://www.forbes.com/sites/leemathews/2017/02/07/2016-saw-an-
insane-rise-in-the-number-of-ransomware-attacks/#3f8a5b9858dc
https://www.symantec.com/content/dam/symantec/docs/infographics/i
str-ransomeware-en.pdf
REFERENCES:
Patch	operating	system,
software,	and	firmware	on
digital	devices	with	latest
updates
Back	up	data	regularly	and
verify	the	integrity	of	those
backups	regularly.	
Secure	your	backups.	Make
sure	they	aren’t	connected	to
the	computers	and	networks
they	are	backing	up.
Follow	the	golden	3-2-1	ruleConfigure	access	controls,
including	file,	directory,	and
network	share	permissions
appropriately
Ensure	antivirus	and	anti-
malware	solutions	are	set	to
automatically	update	and
conduct	regular	scans
Don't	open/delete	any
suspicious-looking	emails	you
receive,	especially	if	they
contain	links	or	attachments.
Be	extremely	wary	of	any
email	attachment	that	advises
you	to	enable	macros	to	view
its	content.
©	2017	Veritas	Technologies	LLC.	All	rights	reserved.	
Veritas,	the	Veritas	Logo,	and	Backup	Exec	logo	are
trademarks	or	registered	trademarks	of	Veritas	Technologies
LLC	or	its	affliates	in	the	U.S.	and	other	countries.	Other
names	may	be	trademarks	of	their	respective	owners.
More	Info	>
Source:	Forbes

Más contenido relacionado

La actualidad más candente

La actualidad más candente (6)

2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
Infographic: Ransomware is the leading form of cyber attack
Infographic: Ransomware is the leading form of cyber attackInfographic: Ransomware is the leading form of cyber attack
Infographic: Ransomware is the leading form of cyber attack
 
BPS-DellWorld
BPS-DellWorldBPS-DellWorld
BPS-DellWorld
 

Similar a Ransomware: Are you Protected?

Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
James Herold
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
Symantec
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
Taylre Janak
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
Kim Jensen
 

Similar a Ransomware: Are you Protected? (20)

Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Datto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rhDatto stateofthechannelransomwarereport2016 rh
Datto stateofthechannelransomwarereport2016 rh
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Symantec Intelligence Report
Symantec Intelligence ReportSymantec Intelligence Report
Symantec Intelligence Report
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
 13 Ransomware Statistics That Will Make You Rethink Data Protection  13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 

Más de Veritas Technologies LLC

Más de Veritas Technologies LLC (20)

Veritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, TurkeyVeritas Vision Solution Day 2020, Istanbul, Turkey
Veritas Vision Solution Day 2020, Istanbul, Turkey
 
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 PresentationExperience Data Management Clarity with Veritas - VMworld 2019 Presentation
Experience Data Management Clarity with Veritas - VMworld 2019 Presentation
 
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
How to Extend Availability to the Application Layer Across the Hybrid Cloud -...
 
Get trust and confidence to manage your data in hybrid it environments japanese
 Get trust and confidence to manage your data in hybrid it environments japanese Get trust and confidence to manage your data in hybrid it environments japanese
Get trust and confidence to manage your data in hybrid it environments japanese
 
VSD Madrid 2019
VSD Madrid 2019VSD Madrid 2019
VSD Madrid 2019
 
VSD Istanbul 2018
VSD Istanbul 2018VSD Istanbul 2018
VSD Istanbul 2018
 
VSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco ServicesVSD Paris 2018: Vertical Use Case - Telco Services
VSD Paris 2018: Vertical Use Case - Telco Services
 
VSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public SectorVSD Paris 2018: Vertical Use Case - Public Sector
VSD Paris 2018: Vertical Use Case - Public Sector
 
VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing VSD Paris 2018: Vertical Use Case - Manufacturing
VSD Paris 2018: Vertical Use Case - Manufacturing
 
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, InsuranceVSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
VSD Paris 2018: Vertical Use Case - Banking, Finance, Insurance
 
VSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation FinaleVSD Paris 2018 - Présentation Finale
VSD Paris 2018 - Présentation Finale
 
Nutanix .NEXT London 2018
Nutanix .NEXT London 2018  Nutanix .NEXT London 2018
Nutanix .NEXT London 2018
 
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
Gartner IT Infrastructure Operations & Cloud Strategies Conference 2018: Rise...
 
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
VSD Zurich 2018: 360 Data Management and Take Control Over the Most Valuable ...
 
VSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital TransformationVSD Zurich 2018: The Secret to Successful Digital Transformation
VSD Zurich 2018: The Secret to Successful Digital Transformation
 
Take Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and SimplicityTake Control Over Storage Costs with Intuitive Management and Simplicity
Take Control Over Storage Costs with Intuitive Management and Simplicity
 
VSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data OpportunityVSD Zurich 2018: The Data Opportunity
VSD Zurich 2018: The Data Opportunity
 
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
VSD Seoul 2018: VMware Cloud Foundation on "The Future of Private Cloud"
 
VSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScaleVSD Seoul 2018: customer highlights on InfoScale
VSD Seoul 2018: customer highlights on InfoScale
 
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire InsuranceVSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
VSD Seoul 2018: a Veritas customer case with Meritz Fire Insurance
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Ransomware: Are you Protected?

  • 1. Ransomware has quickly emerged as one of the most dangerous cyberthreats facing both organizations and consumers, with global losses now likely running to hundreds of millions of dollars. Adopting the Veritas multilayered strategy approach to security minimizes the chance of infection. 71% of organizations targeted by ransomware end up infected. 209 Paid to ransomware criminals in Q1 2016 United State 28 Other Regions 19 Canada 16 Australia 11 India 9 Japan 4 Italy 4 United Kingdom 3 Germany 2 Netherlands 2 Malaysia 2 Services 38 Manufacturing 17 Public Administration 10 Finance, Insurance, & Real Estate 10 Wholesale Trade 9 Transportation, Communications, & Utilities 7 Retail Trade 4 Construction 4 Mining 1 Agriculture, Forestry, & Fishing 1 PLATFORMS AFFECTED BY RANSOMWARE Victims need to be aware that paying the ransom does NOT always work. Attackers may not send a decryption key, could poorly implement the decryption process and damage files, and may deliver a larger ransom demand after receiving the initial payment. Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s data. RANSOMWARE INFECTIONS ARE DUE TO EMAILS WITH MALICIOUS LINKS & ATTACHMENTS $679 million That's more than 167 times the number of attacks in 2015! Source: CNN Source: Symantec Source: Symantec Source: Osterman Research https://blog.barkly.com/ransomware-statistics-2016 https://www.forbes.com/sites/leemathews/2017/02/07/2016-saw-an- insane-rise-in-the-number-of-ransomware-attacks/#3f8a5b9858dc https://www.symantec.com/content/dam/symantec/docs/infographics/i str-ransomeware-en.pdf REFERENCES: Patch operating system, software, and firmware on digital devices with latest updates Back up data regularly and verify the integrity of those backups regularly. Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up. Follow the golden 3-2-1 ruleConfigure access controls, including file, directory, and network share permissions appropriately Ensure antivirus and anti- malware solutions are set to automatically update and conduct regular scans Don't open/delete any suspicious-looking emails you receive, especially if they contain links or attachments. Be extremely wary of any email attachment that advises you to enable macros to view its content. © 2017 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and Backup Exec logo are trademarks or registered trademarks of Veritas Technologies LLC or its affliates in the U.S. and other countries. Other names may be trademarks of their respective owners. More Info > Source: Forbes