Cybercriminals have ramped up their ransomware attacks and you may be surprised by the four ways they gain access to your system. In this episode of CYBER24, presented by VLCM, we break down how the hackers get past your defenses and look at alarming trends with ransomware attacks.

Top Trends

You can read more on zdnet.com.

Hackers gain access to business networks through various attack vectors. Here are the most effective methods for them right now:

RDP Compromise (47%)
Phishing Email (26%)
Vulnerability Exploit (17%)
Account Takeover (10%)

The news gets worse. Hackers used to have a sense of “honor among thieves,” meaning they would quickly give victims the encryption key as soon as they paid the ransom. More frequently than ever before, hackers export your data and threaten to release it publicly if you don’t pay the ransom. Some hackers collect the ransom only to refuse to unlock the data until you pay a second ransom. These trends create additional stress for business leaders already dealing with seismic shifts in day-to-day operations due to the pandemic.

Panelists

Dan Schuyler, VLCM
Anthony Booyse, Sophos
Phillip Kemp, VLCM

VLCM – 7 Steps to Protect Yourself from Ransomware

 

A proud sponsor of CYBER24