The Ransomware Survival Guide

What Every Organisation Needs To Know Before, During And After An Attack

Add bookmark
Ransomware Survival Guide

Ransomware is an old threat that has come roaring back with a new ferocity. This type of malware—which gets its name from the payment it demands after locking away victims’ files— has quickly become one of the top types of cyber-attacks.

More than half of companies surveyed in a recent Ponemon Institute poll said they have experienced a ransomware attack. Among that half, victims saw an average of four attacks each. They paid an average of $2,500 per attack.

Aside from the ransom itself (assuming victims pay), these attacks can exact a heavy toll: business disruption, remediation costs, and a diminished brand. Most ransomware spreads through phishing email, though mobile devices and infected websites are also vectors.

Most companies are ill-prepared for a ransomware attack. Although 66% of those surveyed in the Ponemon poll agree that ransomware is "very serious", only 13% said their company can prevent it.

The best security strategy is to avoid ransomware altogether. This requires planning and work—before the crisis hits. Download this Ransomware Survival Guide to prevent against a ransomware attack and know what to do if you become affected.

This whitepaper will help your organisation learn:

  • What is behind the latest surge in ransomware attacks
  • The various threat vectors exploited by the criminals for these attacks
  • How to build a multi-channel security strategy to prevent and protect against ransomware
Sponsored By:

More From Proofpoint

How to strengthen email security and protection against advanced ransomware atta...

Organizations need to act today to overcome changing email security threats as ransomware tactics co...

 2022-08-31  by Ben Watts
How to strengthen email security and protection against advanced ransomware attacks

The Role Of Human Factors In Enterprise Cyber Security

Regardless of the means of attack—email, cloud applications, the web, social media, or other vectors...

 2020-02-10  by CSHub.com Editorial Staff
The Role Of Human Factors In Enterprise Cyber Security

Cyber Insecurity: Managing Threats From Within

How are security executives managing the frequency and severity of people-centric threats? This whit...

 2020-01-14  by CSHub.com Editorial Staff
Cyber Insecurity: Managing Threats From Within

The Best Kept Email Security Secrets

Organizations face a changing threat landscape and a rise of targeted email attacks. Security teams...

 2019-11-06
The Best Kept Email Security Secrets

Global Security Trend: Email Attacks Shifting From Endpoints To People

Cyber-attacks are evolving from endpoints to valuable individuals in your organization. Data from pr...

 2019-10-01  by Jeff Orr
Global Security Trend: Email Attacks Shifting From Endpoints To People

Recommended