Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038

    Over One-Third of Companies Who Pay the Ransom are Targeted for a Second Time

    Despite the somewhat logical notion that once you’ve paid the ransom, the attack is over, new data shows that paying the ransom doesn’t help you anywhere near how much you think it does.

    Everyone planning for a ransomware attack has some kind of scenario in mind of how it’s going to go. Even with a solid incident response plan, this is all well and fine, but it’s necessary to take a look at industry data that spells out what the reality of organizations that have actually gone through an attack looks like.

    This is what we find in the Cyber Readiness Report 2022 – Ransomware Update from U.K. cyber insurer Hiscox. In it, readers get a glimpse into how ransomware attacks start, whether they paid the ransom, and what happened after they did.

    The results are a bit startling.

    • Only 59% said they successfully recovered all their data
    • 43% had to still rebuild systems, despite having the ransomware recovery key
    • 34% recovered some of their data
    • 15% said the recovery key didn’t work at all

    But the story doesn’t just end there. What about the attack itself? According to the data, it’s far from being over:

    • 36% sustained a second ransomware attack
    • 29% had their data leaked
    • 19% were asked for more money by the attacker

    And because 62% of Hiscox respondents said phishing emails are the most common method of entry, it’s evident that this is one of the weak spots in most organizations, and is where more effort needs to be placed to protect the organization. One of the most effective ways is through continual Security Awareness Training, which educates users on the latest scams and social engineering tactics used in these kinds of attacks.

    Get Your Ransomware Hostage Rescue Manual

    This 26-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

    1. What is Ransomware?
    2. Am I Infected?
    3. I’m Infected, Now What?
    4. Protecting Yourself in the Future
    5. Resources

    Don’t be taken hostage by ransomware. Download your rescue manual now! 

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser:

    Sign Up to the TIO Intel Alerts!

    Back To Top