Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Users value the data stored on their devices at $682 on average

by The Gurus
July 15, 2016
in Editor's News
Share on FacebookShare on Twitter

During its annual research project, that investigates user behaviour on the Internet, Kaspersky Lab and B2B International have discovered the average value of files stored on user devices exceed more than twice the average ransom demanded by cybercriminals for decrypting data after infecting it with crypto-ransomware. These figures explain why so many people are willing to pay extortionists, and once again, demonstrate the need for preventive protection measures against online threats.
 Malicious programs designed to encrypt personal data and demand ransom for its decryption, have been continuously growing in number in recent months. The popularity of this type of threat is, to a large extent, explained by its effectiveness. According to the statistics, at least 40 per cent of victims pay fraudsters to restore their files. This is not surprising, especially considering the fact that the average ransom demanded is $300, while users say that the cost of restoring the data on their devices would be $682 on average. Moreover, for 39 per cent of respondents this figure exceeds $1,000.
Nine out of ten users report storing important personal information such as photos, video, messages, contacts etc., on their devices and admit that if these were lost, they would not be able to restore 15 per cent of this data. According to the respondents, the most difficult thing is to restore private messages (36 per cent believe they will be lost forever if something happens to the device) and photos (27 per cent).
Despite the fact that users set a high value on the contents of their devices, not all of them take proactive protection measures and instead run the risk of having to pay hundreds of dollars to restore lost data. For example, only nine out of ten respondents install protection on Windows computers, and even less (six out of ten) on Macs. And nearly a quarter of users (23 per cent) do not backup even their most important files.
“It is interesting that people value their data highly and understand its irretrievability, but do so little to protect it – preferring to solve problems as they arrive. However, in cases of malicious encryption, even paying a ransom does not guarantee that the data will be returned to the owner. Unfortunately, ransomware is not the only threat jeopardising personal data. For example, data may be lost or stolen together with a device. This all means that careless user behavior may result in an emotionally upsetting experience as well as considerable financial loss”, says Elena Kharchenko, Head of Consumer Product Management, Kaspersky Lab.
Kaspersky Lab’s solutions combat all known types of ransomware to secure user’s data. When these solutions are in place, most ransomware is “caught” while attempting to penetrate a device. Nonetheless, even if malware does manage to sneak through, there is another layer of protection – System Watcher technology – that is able to block and roll back malicious changes made on a device, such as the encryption of files or blocked access to the monitor. In addition, Kaspersky Total Security, the security solution for families, also includes a backup feature for Windows devices to create copies of important files for unforeseen situations.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Digital skill shortage could lead to increased security risks and failed cloud migrations

Next Post

IT and financial auditors warn that poor IT risk practices are rife amongst small businesses and start ups

Recent News

Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023
A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information