Free Newsletters for the Channel
Register for Your Free Newsletter Now
Lack of preparedness intensifies the impact of holiday/weekend attacks.
November 19, 2021
Nothing says the holidays like decorations, parties, presents, mistletoe and now, apparently, ransomware.
Cybereason has published a global study of more than 1,200 security professionals at organizations that have previously suffered a successful ransomware attack on a holiday or weekend. The study highlights the disconnect between organizational risk and preparedness.
Among the key takeaways:
Ninety percent are concerned about upcoming holiday/weekend ransomware attacks. However, nearly one in four said their organizations do not have a specific plan or policy in place.
Eighty-six percent report missing a holiday or important weekend activity with family and friends.
Seventy percent report being forced to respond to a ransomware attack while intoxicated to get the job done.
The lack of preparedness for ransomware attacks on weekends and holidays has a significant impact on victim organizations. Sixty percent of respondents said it took longer to assess the scope of an attack. One-half said they needed more time to mount an effective response. Furthermore, one-third (33%) said they needed more time to fully recover from the attack. This research validates the assumption that it takes longer to assess, mitigate, remediate and recover from a ransomware attack over a holiday or weekend.
The retail and transportation sectors present high-value targets for ransomware attackers, according to Cybereason. That’s because the potential for disruption and lost revenue increase incentives for victims to pay higher ransom demands.
Nearly 70% in both retail and transportation said a previous ransomware attack was successful because they didn’t have the right security solutions in place. In addition, one in four (24%) said their organizations still don’t have a specific contingency plan to address the risk from weekend and holiday attacks despite previously having been a victim.
To learn more, we spoke with Israel Barak, Cybereason‘s chief security information officer.
Channel Futures: What are the most surprising findings in this study?
Cybereason’s Israel Barak
Israel Barak: Despite having already been a victim of a ransomware attack, too many organizations still do not have the most basic technologies in place to prevent being a victim again — such as endpoint prevention like next-generation antivirus (NGAV) or endpoint detection and response (EDR) for proactive threat hunting and early detection of RansomOps.
Scroll through our slideshow above for more from Cybereason and more cybersecurity news.
You May Also Like
CrowdStrike, SonicWall Cyber Threat Reports Highlight Attacks, Popular TacticsFeb 21, 2024
Zscaler, Juniper, Cato Launch New B2B Tech ServicesFeb 21, 2024
Meet Channel Futures' 50 Channel Influencers for 2024Feb 20, 2024
The Gately Report: Menlo Security Tackling Browser Attacks, AI ThreatsFeb 19, 2024