June 7, 2023
Less than half of organizations worldwide have an official ransomware reaction strategy in location, Thales research finds. by D. Howard Kass - Mar 28, 2022 Organizations are still not attending to cybersecurity concerns effectively enough regardless of high awareness of the dangers of attacks, a new study…

< img width ="1024"height= "294" src ="https://www.msspalert.com/wp-content/uploads/2022/02/ransomware-cyberattack-security-GettyImages-1354202603-1024x294.jpg"alt=""/ > Less than half of organizations worldwide have an official ransomware reaction strategy in location, Thales

research finds. by D. Howard Kass – Mar 28, 2022

Organizations are still not attending to cybersecurity concerns effectively enough regardless of high awareness of the dangers of attacks, a new study said.

For example, in a study of 2,700 executives and IT security specialists in 17 nations, 20 percent of the U.S. participants said their companies had been struck by a ransomware attack however 40 percent had no plans to up their cybersecurity defense spending, according to Thales, a Paris, France-based security company, in freshly released research study. Additionally, in the U.S. slightly over half (52%) of companies have a formal ransomware reaction strategy in place while worldwide less than half (48%) have that level of readiness.

Thales’ scientists classified the study’s results by information exposure, cloud adoption and future threats. Here are some of the essential U.S. findings:

  • 24% of U.S. respondents said they have paid or would pay a ransom for their data.
  • Malware was the leading source of attacks (53%), followed by ransomware (49%) and phishing/whaling attacks (42%).
  • Of those IT respondents worldwide who were attacked, 55% say their internal operations were affected, including 19% who stated they were substantially affected and required removal.

Here are some international highlights:

  • Monetary loss, such as lost sales and legal costs, has actually been or would be the greatest impact from a ransomware attack, according to 23%. Others consist of lost efficiency (19%), healing costs (18%), data exfiltration (16%), brand name credibility (11%) and customer loss (7%).
  • 22% of participants worldwide stated they have paid or would pay a ransom for their information.
  • 41% of respondents around the world state they have no strategies to change security spending.
  • 28% have actually included additional budget for ransomware tools.

Here are some of the study’s findings on data visibility.

  • 34% of IT leaders in the U.S. said they are very confident about where their information is being saved, down 3% from the previous year’s research study.
  • Just 16% stated they have complete understanding of where it is saved.
  • 43% of U.S. IT leaders stopped working a compliance audit in the previous 12 months.

Here are some of the research study’s findings on cloud adoption:

  • 40% of U.S. respondents use more than 50 software-as-a-service (SaaS) applications, consisting of 21% who use more than 100 apps.
  • 51% of U.S. IT leaders stated it is more complex to manage personal privacy and information security guidelines in a cloud environment than in on-premises networks within their organization.
  • 33% of U.S. participants stated that roughly half of their work and information reside in external cloud. 29% report more than 60%.
  • 42% of U.S. participants state they are a little or not at all confident that their current security systems can efficiently secure remote work.

And, some information on what’s to come:

  • 24% in the U.S. said broad cloud security tool sets are the greatest future costs priority.
  • 34% in the U.S. stated they expect to prioritize costs on essential management in the future, with Zero Trust a crucial method for 32%.
  • On security risks from quantum computing, 57% in the U.S. are interested in danger of network decryption, followed by essential distribution (53%) and future decryption these days’s data (52%).

Return Home
Source