<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1856953457853813&amp;ev=PageView&amp;noscript=1">

How hackers bypass your defenses and cripple your business with ransomware - New Cyber24 Podcast



Cybercriminals have ramped up their ransomware attacks and you may be surprised by the four ways they gain access to your system. In this episode of CYBER24, presented by VLCM, we break down how the hackers get past your defenses and look at alarming trends with ransomware attacks.


Top Trends

You can read more on zdnet.com.

Hackers gain access to business networks through various attack vectors. Here are the most effective methods for them right now:

RDP Compromise (47%)
Phishing Email (26%)
Vulnerability Exploit (17%)
Account Takeover (10%)

The news gets worse. Hackers used to have a sense of “honor among thieves,” meaning they would quickly give victims the encryption key as soon as they paid the ransom. More frequently than ever before, hackers export your data and threaten to release it publicly if you don’t pay the ransom. Some hackers collect the ransom only to refuse to unlock the data until you pay a second ransom. These trends create additional stress for business leaders already dealing with seismic shifts in day-to-day operations due to the pandemic.


Learn more about how to protect your organization against ransomware with our infographic




Dan Schuyler, VLCM
Anthony Booyse, Sophos
Phillip Kemp, VLCM



Episode 105: How hackers bypass your defenses and cripple your business with ransomware

Listen to the Podcast



This episode of Cyber24 was sponsored in-part by HP. The modern workforce demands ever-changing, versatile work flows. Luckily, HP has built a solid foundation from the ground up, powered by leading 8th gen Intel processors and running Microsoft’s best-ever operating system. Learn more about how together, HP, Intel, and Microsoft exceed the demands of today's mobile work styles at vlcm.com/hp-intel-windows




About Cyber24


CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable formate designed to arm public and private sector leaders with the information they need to protect their organizations.



Tweets by @vlcmtech