Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Half of All Organizations Have Had Employees Approached to Aid in Ransomware Attacks

    Employees Approached to Aid Ransomware Attacks

    Partially due to the shift to working remotely, cybercriminals are finding some resemblance of success in getting internal assistance, begging the question of what to do about it.

    In order for a ransomware attack to be successful, threat actors need plenty of access throughout a victim organization. Most often, we’re seeing this accomplished via honed hacking techniques. But once in a while, we see cybercriminals going the manual route. Back in August, we saw Nigerian threat actors solicit victim organization employees to deploy demon ransomware, offering nearly half the ransom yet-to-be collected.

    New data in an infographic from Hatachi ID shows that an average of 48% of organizations have been approached to assist in helping to plan a ransomware attack. Director-level employees seem to be a more interesting target, with 55% of them being approached.

    One of the reasons for this occurring may be found in the Hitachi ID data; the majority of organizations (83%) believe this solicitation has become more prominent since employees began working remotely.

    The good news is an average of 90% of organizations are providing some form of Security Awareness Training to educate users on how to prevent phishing attacks, create secure passwords, and keep those passwords safe.

    In order to ensure employees do not become the next accomplice, it’s imperative to have proper security solutions in place, as well as to make certain that your awareness training is continual in nature and occurs online, rather than the typical infrequent break room trainings.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RansIm-Monitor3

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 21 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top