Más contenido relacionado La actualidad más candente (6) Similar a Ransomware: Are you Protected? (20) Más de Veritas Technologies LLC (20) Ransomware: Are you Protected?1. Ransomware has quickly emerged as one of the most dangerous cyberthreats facing both organizations and consumers,
with global losses now likely running to hundreds of millions of dollars. Adopting the Veritas multilayered strategy approach
to security minimizes the chance of infection.
71%
of organizations targeted by
ransomware end up infected.
209
Paid to ransomware
criminals in Q1 2016
United State 28 Other Regions 19
Canada 16 Australia 11
India 9 Japan 4
Italy 4 United Kingdom 3
Germany 2 Netherlands 2
Malaysia 2
Services 38 Manufacturing 17
Public
Administration
10 Finance,
Insurance, &
Real Estate
10
Wholesale Trade 9 Transportation,
Communications,
& Utilities
7
Retail Trade 4 Construction 4
Mining 1 Agriculture,
Forestry, & Fishing
1
PLATFORMS
AFFECTED BY
RANSOMWARE
Victims need to be aware that paying the ransom does NOT always work.
Attackers may not send a decryption key, could poorly implement the
decryption process and damage files, and may deliver a larger ransom
demand after receiving the initial payment.
Make sure employees are
aware of ransomware and of
their critical roles in protecting
the organization’s data.
RANSOMWARE
INFECTIONS ARE DUE
TO EMAILS WITH
MALICIOUS LINKS &
ATTACHMENTS
$679
million
That's more than 167 times the number of attacks in 2015!
Source: CNN
Source: Symantec
Source: Symantec
Source: Osterman Research
https://blog.barkly.com/ransomware-statistics-2016
https://www.forbes.com/sites/leemathews/2017/02/07/2016-saw-an-
insane-rise-in-the-number-of-ransomware-attacks/#3f8a5b9858dc
https://www.symantec.com/content/dam/symantec/docs/infographics/i
str-ransomeware-en.pdf
REFERENCES:
Patch operating system,
software, and firmware on
digital devices with latest
updates
Back up data regularly and
verify the integrity of those
backups regularly.
Secure your backups. Make
sure they aren’t connected to
the computers and networks
they are backing up.
Follow the golden 3-2-1 ruleConfigure access controls,
including file, directory, and
network share permissions
appropriately
Ensure antivirus and anti-
malware solutions are set to
automatically update and
conduct regular scans
Don't open/delete any
suspicious-looking emails you
receive, especially if they
contain links or attachments.
Be extremely wary of any
email attachment that advises
you to enable macros to view
its content.
© 2017 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and Backup Exec logo are
trademarks or registered trademarks of Veritas Technologies
LLC or its affliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
More Info >
Source: Forbes