Technology Reseller v41

technologyreseller.co.uk 25 Defensive Measures Remote Desktop Protocol (RDP compromise) 10% 15% 16% 21% Ransomware Attack Vectors This graph shows how ransomware was able to penetrate the system. 5% 13% 7% 12% 2% Malicious website or advertisement Malicious email attachment Malicious email link SMS message Credential/Password phishing Social engineering – vishing Application or software vulnerability Unknown/Not free to disclose The best prepared businesses in our survey were the ones that refused to pay the ransom because they were able to recover their data. Over one-quarter of our respondents fell into this category, and nearly 80 percent of them were able to recover their data in a day or less. The best way to be able to recover data is to back it up. But deploying backup isn’t the only defensive measure businesses should consider. Gaps in protection must be closed to ensure the resilience of the entire system. In our survey, the businesses that experienced ransomware had initiated several cybersecurity improvements to fortify the entire attack surface area and present a unified defense against cyberattacks. It starts by looking at the attack vectors that lead to a ransomware infection in the first place. In our survey, the most common threat vectors were the employees themselves, who had inadvertently visited malicious websites, clicked on malicious email links or attachments, or disclosed their login credentials. The other most common exploits were Remote Desktop Protocol (RDP) and software vulnerabilities.

RkJQdWJsaXNoZXIy NDUxNDM=