The Latest Tripwire News
Product and Solution Information, Press Releases, Announcements
|Tripwire Survey: Security Professionals Lack Confidence in Ransomware Recovery|
|Posted: Thu Sep 01, 2016 10:14:22 AM|
PORTLAND, Ore. — September 1, 2016 — Tripwire, Inc., a leading global provider of endpoint detection and response, security and compliance solutions, today announced the results of a survey of over 220 information security professionals who attended Black Hat USA 2016. The conference took place July 30-August 4, 2016, at the Mandalay Bay Convention Center in Las Vegas, Nevada.
As ransomware and phishing attacks increase in frequency and sophistication, information security professionals remain apprehensive in their organizations’ abilities to protect themselves. When asked if their companies could recover from a ransomware infection without losing critical data, only thirty-four percent of the respondents said they are “very confident” they could do so. Tripwire asked the same question at both RSA Conference 2016 and Infosecurity Europe 2016, finding thirty-eight percent and thirty-two percent of respondents were “very confident,” respectively.
“Successfully recovering from ransomware is well documented, whether through data recovery to paying ransom,” said Travis Smith, senior security research engineer at Tripwire. “It’s important for businesses to understand the costs associated with data recovery so that they’re prepared for a ransomware infection. Follow the 3-2-1 data backup rule: gather three copies of the data on two different types of media, with one of these copies stored off-site.”
The FBI has reported that ransomware attacks amassed over $200 million during the first three months of 2016, signaling that cyber criminals are on track to gain over $1 billion through ransomware by the end of the year. According to research from Malwarebytes, nearly 40 percent of businesses experienced ransomware attacks between June 2015 and June 2016. Ransomware infections can be spread through a variety of tactics, including spear-phishing, malvertising, exploit kits and more.
Additional findings from the survey included:
Smith continued: “Training is a vital aspect of preventing successful phishing attacks, especially as spear-phishing and ‘whaling’ campaigns can be more difficult to detect. It’s increasingly important for executives and high-profile employees to be prepared. Users should assume links and attachments are guilty until proven innocent; verify the sender’s intent before trusting their data.