Cybercriminals have ramped up their ransomware attacks and you may be surprised by the four ways they gain access to your system. In this episode of CYBER24, presented by VLCM, we break down how the hackers get past your defenses and look at alarming trends with ransomware attacks.
You can read more on zdnet.com.
Hackers gain access to business networks through various attack vectors. Here are the most effective methods for them right now:
RDP Compromise (47%)
Phishing Email (26%)
Vulnerability Exploit (17%)
Account Takeover (10%)
The news gets worse. Hackers used to have a sense of “honor among thieves,” meaning they would quickly give victims the encryption key as soon as they paid the ransom. More frequently than ever before, hackers export your data and threaten to release it publicly if you don’t pay the ransom. Some hackers collect the ransom only to refuse to unlock the data until you pay a second ransom. These trends create additional stress for business leaders already dealing with seismic shifts in day-to-day operations due to the pandemic.
Learn more about how to protect your organization against ransomware with our infographic.
Dan Schuyler, VLCM
Anthony Booyse, Sophos
Phillip Kemp, VLCM
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | RSS
This episode of Cyber24 was sponsored in-part by HP. The modern workforce demands ever-changing, versatile work flows. Luckily, HP has built a solid foundation from the ground up, powered by leading 8th gen Intel processors and running Microsoft’s best-ever operating system. Learn more about how together, HP, Intel, and Microsoft exceed the demands of today's mobile work styles at vlcm.com/hp-intel-windows.
This episode of Cyber24 was sponsored in-part by Sophos Intercept X. Sophos Intercept X stops the widest range of attacks with a unique combination of deep learning malware detection, exploit prevention, anti-ransomware, and more. Learn more at about the #1 Rated Endpoint Protection at vlcm.com/intercept-x.
CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable formate designed to arm public and private sector leaders with the information they need to protect their organizations.