How to Prepare for Ransomware Attacks

Ransomware attacks continue to increase, and bad actors are using techniques that are more sophisticated and targeted. In order to help protect their organizations from ransomware, security and risk management leaders need to look beyond just the endpoints.

This report from Gartner® identifies key findings and vulnerabilities organizations should be aware of, including how:

  • Phishing and unauthorized remote desktop connections continue to be the primary sources of infiltration for ransomware, exacerbated by the growth in remote work.

  • Bad actors are mining exfiltrated data to identify other potential sources for revenue.

  • The cost of recovery, downtime, and reputational damage in the aftermath of a ransomware attack can be 10 times the amount of the ransom itself.

Also, see Gartner recommendations for preparing for, detecting, and responding to ransomware.

Gartner, How to Prepare for Ransomware Attacks, Paul Furtado, 16 June 2022
Gartner is registered trademark and servicemark of Gartner, Inc and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Read the Report

Please wait for the form to load