In 2017, the world experienced some of the most devastating cyber attacks yet. Most ransomware campaigns were successful due to insider negligence. In some cases, this was achieved with malicious intention by way of an external actor using an insider’s credentials. While there have been a number of remote storage options to help organizations rapidly recover in the event of a ransomware attack, the problem of the attack happening in the first place needs to be prevented.

Ransomware in review

Ransomware is a type of malware that encrypts all data on your device and holds your data for ransom until you make a payment to the hackers. Much more dangerous variants can lock your hard drives down or can delete your files after encrypting them. Ransomware attacks hit an all-time high in 2017.

Some of the worst ransomware was not just developed but also launched in successful global
campaigns. The most well-known were WannaCry which impacted the National Health Service of the UK, NotPetya which impacted FedEx and BadRabbit which took down Kiev’s metro system. The campaign for each of these ransomware attacks impacted hundreds of companies and thousands of computers across the globe. The ransomware attacks have cost companies billions and caused widespread economic and social impacts in the countries affected. Continue reading in CSOOnline.

Top Posts in Insider Threats & Monitoring

  1. The Decline of the Rogue Employee: Utilizing Behavioral Trends
  2. Insider Threat Statistics: 8 Convincing Findings [Infographic]
  3. 4 Different Types of Insider Attacks [Infographic]
  4. Where Hackers Roam: Enter The Darknet