Cyberthreats, particularly ransomware, are part of everyday life. In fact, new ransomware attacks happen every 11 seconds (and it’s expected to increase to every 2 seconds by 2031). That frequency adds up to thousands of opportunities each day for cybercriminals to infiltrate your business.
You can’t completely prevent ransomware. But the more you know about it and how it operates, the better prepared you can be to stop ransomware in its tracks and to minimize the resulting damage to your organization.
Cybercriminals are smart (and they’re getting smarter every day). Their infiltration tactics are much more sophisticated than someone who’s guessing user names and passwords to hack into your systems. In fact, they’re usually clever enough to get end users to do all the heavy lifting for them.
By far, the most common threat comes by way of phishing emails. Nearly 66% of ransomware threats are delivered in phishing emails that either install and spread malware or coerce recipients into providing the secure information that the attackers are looking for. With one out of three employees likely to click the links in a phishing email, the chances of your business being infected by ransomware through a phishing technique are high.
Another way that cybercriminals break into your organization is by using stolen credentials that they have purchased on the bootleg market to access your internal systems and data. And although we like to think of cybercriminals as strangers in dark rooms thousands of miles away, possibly the most dangerous are attackers who work from the inside.
Insiders have the security credentials to access your most critical systems and data, without raising suspicions. They know exactly which data is most valuable to your business and where that data resides—giving them incredible power to take your business hostage. Nearly one-third of ransomware attacks come from malicious insiders.
Ransomware attacks are not one-size-fits-all, but there are three main strategies that cybercriminals use to succeed in their attack:
So, what does an attack usually consist of? During an attack, cybercriminals encrypt, delete, corrupt, or just outright steal your data. For example, an attacker might encrypt your data and then demand ransom in exchange for the encryption key. Or an inside attacker might copy confidential competitive information onto a thumb drive, delete it from your systems, and then demand ransom in exchange for not sharing the information with competitors.
As cybercriminals become more innovative, the use of multiple extortion techniques is also becoming more common. For example, criminals demand ransom for encrypted files, but if the ransom isn’t paid quickly, they threaten to publicly leak confidential data, adding reputational damage on top of financial damage.
Regardless of the tactics and strategies that a cybercriminal uses, the best way to defend your organization against their attacks is to protect your data. Encrypt your data at rest and in flight. Make sure that you always have current backups in place and that those backups are easily recoverable. Take advantage of data protection technologies that enable you to make your data immutable and indelible. It’s game over for cybercriminals when they can’t cause havoc with your data.
That defense may sound easier said than done. But when it comes to data security and data protection, nobody knows better than NetApp. To see how easy and powerful it is to take a data-centric approach to security and protection, check out NetApp® cyber-resilience and ransomware solutions.
Jason is a business and marketing professional with over 20 years of product marketing, product management, and corporate finance experience. Since joining NetApp in 2008 he has been focused on SAN and NAS storage, backup and disaster recovery solutions, and cloud data services. When not in the office, you can find him cycling, cooking, enjoying time with family, and volunteering at his church and in the community.
Brush up on the latest trends and developments in cloud, on premises, and everywhere in between. This is where it all gets real, with a cherry on top.
Explore a wide range of open forums where you can post questions, share answers and just generally get smart on all the NetApp technologies that matter most to you.