DTX Manchester DTX Manchester
  • About Us
Monday, 25 January, 2021
IT Security Guru
CTX Manchester 2020 banner ad
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Ransomware behind 42% of IT security breaches in UK organisations during 2015

by The Gurus
January 26, 2016
in Editor's News
Share on FacebookShare on Twitter

Foursys – cybersecurity specialist for more than 20 years – today shares the results of its IT security survey, conducted last month. The results, displayed here as an infographic,  show that ransomware was behind 42% of security breaches.
More than 400 UK-based IT managers took part in the Foursys survey, revealing insights into their security posture. Over half of the respondents worked in organisations with more than 500 employees. 
Survey highlights
Overall, 62% of respondents expect IT security to have a higher priority in 2016.
15% of respondents reported an IT security breach in 2015. Of those who reported a breach:

  • 42% said they suffered a ransomware attack;
  • 10% reported significant disruption to systems;
  • 11% admitted to data loss as a result of the breach.

Ransomware is a malware technique that effectively takes your computer or network hostage by encrypting files, folders and/or applications. The goal is to extort money from the victims, often via difficult-to-trace digital currencies like Bitcoin, in exchange for restoring the files.
“With so many victims paying out, it is no wonder that ransomware is becoming more and more attractive to cyber criminals,” said James Miller, Managing Director at Foursys. “Once files are encrypted, you’d better hope your backups are secure and up to date, or pay the fine and keep your fingers crossed that the files will be decrypted!”
Even if hackers do unlock your encrypted files after receiving payment, cooperative victims might be revisited for future extortion.
Independent computer security expert Graham Cluley said:
“Online extortion – whether it be by ransomware encrypting victims’ files and locking up computers, or demanding payment to stop blasting websites offline through denial-of-service attacks – is surging and only likely to get worse in the next six months. Unless companies take steps now to reduce the risks with a layered defence and recovery procedures they may find themselves struggling to cope.”
Foursys strongly advises UK organisations to review their security posture to prevent cyber attacks like ransomware.  “The only real defence from ransomware attacks is prevention. Deter them by making your organisation a seriously ugly target,” continued Miller.
Tips to thwart ransomware attacks
Foursys security experts recommend that organisations do the following to better prevent a ransomware attack:

  • ensure all security patches are up to date;
  • run the latest version of security software to prevent unauthorised access;
  • execute penetration tests to discover unknown vulnerabilities; and
  • ensure all staff, including senior management, are kept abreast of the latest threats and their impact on business continuity.

Backing up data regularly and ensuring it’s kept safe is equally important. This approach allows potential victims to restore normal operation without having to engage with criminals.

0 0 vote
Article Rating
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Global study shows increasing security risks to payment data and lack of confidence in securing mobile payment methods

Next Post

AppRiver's Jonathan French on Ransomware

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

banking

BTG+ implements Feedzai’s Artificial Intelligence solution

January 22, 2021
Cybersecurity Failure among Highest Risks, warns World Economic Forum

Cybersecurity Failure among Highest Risks, warns World Economic Forum

January 22, 2021
Small caution cone placed over the 'enter' key on a macbook keyboard.

The Top 5 Phishing Scams of 2020

January 22, 2021
Two gloved hands holding up a globe wearing a surgical mask

Fake COVID-19 Test Certificates Pose Risk to Air Travel

January 22, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept