Contenu connexe Plus de Veritas Technologies LLC (20) Ransomware Infographic - Are you protected?1. Ransomware
Infections by Region5
#RANSOMWARE
Are you PROTECTED?
Ransomware has quickly emerged as one of the most dangerous
cyberthreats facing both organizations and consumers, with global losses
now likely running to hundreds of millions of dollars. Adopting the Veritas
unified approach to backup helps ensure you are protected, regardless
of where your data resides.
With the Desktop and Laptop Option (DLO) you can even protect user files
on up to 130,000 desktops and laptops, Windows and Mac.
Adopting a multilayered approach minimizes the chance
of infection. Veritas has a strategy that protects against
ransomware in three easy steps:
638,000,000
number of ransomware
attacks worldwide in 2016!1
Ransomware is a
threat to all major
operating platforms:
PRIMARYTARGETS
$209,000,000
Ransomware Protection
That's a 16,700% increase from 2015!
Ransoms can
be as high as
$10,000
per user, paid
in untraceable
Bitcoin
Paid to ransomware criminals in Q1 20164
71%
of organizations
targeted by
ransomware
end up infected3
INFECTION
TRENDS59%
of ransomware infections are
due to emails with malicious
links & attachments6
Ransomware Infections
by Organizations
Services
Public
Adminstration
Wholesale Trade
Retail Trade
Mining
Manufacturing
Finance, Insurance
& Real Estate
Transportation,
Communications
& Utilities
Construction
Agriculture,
Forestry & Fishing
Save now
FOLLOW US ON
© 2017 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and Backup Exec logo are
trademarks or registered trademarks of Veritas Technologies
LLC or its affiliates in the U.S. and other countries. Other
names may be trademarks of their respective owners.
REFERENCES:
1 - https://blog.barkly.com/ransomware-statistics-2016
2 - Intermedia Ransomware 101: What your business needs
to know about ransomware attacks
3 - https://blog.barkly.com/cyber-attack-statistics-2016
4 - https://blog.barkly.com/cyber-attack-statistics-2016
5 - https://www.symantec.com/content/en/us/enterprise/
media/security_response/whitepapers/ISTR_Ransomware_
and_Businesses.pdf
6 - https://blog.barkly.com/cyber-attack-statistics-2016
7 - https://www.symantec.com/content/dam/symantec/docs/
infographics/istr-ransomeware-en.pdf
We have some fantastic time-limited special
offers too. So get unified backup with Veritas.
The timing – and the savings – couldn’t BE better.
EDUCATE
• Make sure employees know
the dangers – and know
what to do
• Don't open suspicious-looking
emails, links or attachments…
• … Especially those advising
you to enable macros
• Beware pop-ups and software
with optional installs
• Scan all external storage
• Ensure their desktops and
laptops, which hold 60% of
corporate data, are backed up
PROTECT
• Back up regularly and
frequently, including endpoints
• Store backups separately
• Test and verify backups
regularly
• Secure your backups.
And isolate them from the rest
of the network
• Test your data recovery
capabilities
SECURE
• Install security software
• Keep it up-to-date.
No exceptions
• Ensure that OS, software and
firmware stay patched on
all devices
• Set antivirus and anti-malware
to auto scan and update
• Configure access controls and
permissions appropriately
• Automate file and backup
recovery on Windows and Mac
desktops and laptops
RANSOMWARE –
Should you pay?
YES
NOVictims need to be aware that paying
the ransom does NOT always work.
The malware could poorly implement the
decryption process and damage files,
and may deliver a larger ransom
demand after receiving the initial
payment. And worse - 20% of those
who do pay, never receive a
decryption key.7
UNITED
STATES
28%
19%OTHER
REGIONS
UNITED
KINGDOM
3%
CANADA16%
AUSTRALIA11%
JAPAN4%
INDIA9%
MALAYSIA2%
ITALY4%
NETHERLANDS2%
GERMANY2%
• Apple™ • Linux™
• Android™• Microsoft
Windows™