Blogs By this
author
- Embracing the Modern Workplace
- Unlock Business Agility with Outsourced IT Services
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- AWS Migration Competency – recognition of Comunet’s leadership and expertise in cloud migration services
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- The Software Development Life Cycle
- What is a Business Analyst and what do they do?
- Christmas Cyber Security Tips
- Off the Shelf vs Custom Software – 7 Things to Consider
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Comunet and AWS – delivering secure, scalable and trustworthy services non-profits
Related blogs
to this blog
- What is ISO 27001 Certification?
- Protect Your Business: The Essential Eight and Beyond
- An Overview of ISO 27001:2022
- Social Engineering Attacks: Proofpoint’s 2022 Social Engineering Report
- Increasing Email Security to Avoid Business Email Compromise
- Cyber Security Risk Management – Threats are Evolving Much Faster Than Australian Businesses
- How to Avoid Being Scammed Online
- How to Prevent Phishing Attacks
- Myth Busting Cloud Security – How Secure is the Cloud?
- The Log4j Vulnerability: What Happened and What’s the Impact
- Christmas Cyber Security Tips
- The COVID-19 digital vaccination certificate and the value of cyber security audits
- Passwords are not enough – why you need Multi Factor Authentication
- Building innovation culture
- Getting out of the swamp: Accelerated Data Lake on AWS
There is a concept not unique to Information Technology but frequently used in this field “alert fatigue”. It is a recognised challenge that exposure to an overwhelming number of alerts will eventually desensitise the people in charge of responding to them. You may have heard the word “ransomware” thrown around so many times in the past few years that you’re starting to feel some of that fatigue yourself.
This month Sophos, a British based security software and hardware company, released their 2022 State of Ransomware report based on information received from over 5,000 respondents in the IT industry.
Alarmingly, the number of organisations hit by ransomware attacks in the last year has doubled compared to the year before.
The report also highlights that paying the ransom is not a reliable option – of the organisations that paid the ransom, on average only 61% of encrypted data was restored after payment. Only 4% of organisations that paid the ransom had all their data restored.
So how do you protect yourself against ransomware attacks?
Frequent backups tested regularly remain the best option for restoring data after a ransomware attack. Your backups should never be considered viable if you do not regularly test to confirm you could use them to successfully restore data in an emergency scenario.
If you or your business have any questions, queries, or doubts about how to protect yourself against ransomware attacks, please feel free to get in touch.