Remove eBook Remove Ransomware Remove Threat Reports
article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Here are some of the findings from the report. Ransomware.

article thumbnail

4 ways ransomware can cost your business (in addition to extortion)

Webroot

Cybersecurity analysts are charting both a rise in ransomware incidents and in amounts cybercriminals are demanding from businesses to restore their data. Our latest threat report found the average ransomware payment peaked in September 2020 at more than $230 thousand. Lost productivity. Impact on client operations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Reasons We Forget Small & Midsized Businesses are Major Targets for Ransomware

Webroot

The ransomware attacks that make headlines and steer conversations among cybersecurity professionals usually involve major ransoms, huge corporations and notorious hacking groups. Kia Motors, Accenture, Acer, JBS…these companies were some of the largest to be compromised by ransomware in 2021.

article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

Threats abound in 2021. In 2021, we witnessed so many competing shifts, many of which we detailed early on in our 2021 BrightCloud® Threat Report. Ransomware. Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. The evolution of ransomware as a service (RaaS) has vastly proliferated.

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

In fact, our 2020 Threat Report found that impersonators are now imitating legitimate business websites to release malicious payloads or steal data, and a shocking 27% of phishing sites use HTTPS to trick the user into clicking phishing links, which makes these attacks even more dangerous.

Scams 114
article thumbnail

What is digital sovereignty and how can you achieve it in the cloud?

Thales Cloud Protection & Licensing

According to the new 2022 Data Threat Report, produced by 451 Research for Thales, 34% of global organizations are using at least 50 SaaS applications and 17% use 100 or more SaaS applications. But in the cloud, this is easier said than done. Organizations rely on a myriad of cloud services.

article thumbnail

How to Accelerate Government Transformation by Reducing Risk, Complexity, and Cost

Thales Cloud Protection & Licensing

In the 2022 Thales Data Threat Report 451 Research found that 39% of US federal agencies use 50 or more SaaS applications, and 83% store more than 30% of all their data in the cloud. Cloud adoption, essential for convenient services and efficient collaboration, is widespread and growing fast.