Get Started Today!  (415) 295-4898

croom new

415 IT Blog

New Study Finds That Paying Off Your Ransomware Attackers Has Some Severe Consequences

New Study Finds That Paying Off Your Ransomware Attackers Has Some Severe Consequences

We know, we know; you’re probably sick of seeing ransomware in headlines, and so are we, but we cannot stress enough how important having an awareness of it is for any business owner. A new study has found that businesses infected by ransomware who choose to pay up experience a different type of fallout--one that is a major cause for concern and a stark reminder that there are no guarantees with ransomware. Ever.

A Cybereason survey, conducted by Censuswide, polled 1,263 security professionals from all over the world and discovered some concerning results. Here are some of the major takeaways, specifically related to companies that paid their ransomware attackers:

  • 80% of organizations that paid their ransomware attackers the ransom experienced a second attack.
  • Of these organizations, 46% believe that the same hackers were responsible.
  • 46% of organizations that paid the ransom found that at least some of their data was corrupted.
  • 51% of organizations did not experience data loss or corruption.
  • 3% were not able to retrieve their data at all.

This study confirms something that we have been preaching for years. Why should you ever trust a hacker who has encrypted and stolen your data to return it to you? It just doesn’t make sense. Furthermore, when you pay hackers to decrypt your data, you are doing two things. For one, you are inadvertently funding future ransomware attacks by providing the funding hackers need to execute such attacks. You are also showing hackers, and everyone else watching the situation, that ransomware works, which is a far more dangerous idea to foster. If cybercriminals see that these attacks work, they continue to propagate them.

Granted, we understand that it’s not always so simple; the recent rise in “double-extortion” ransomware puts a lot of pressure on organizations to pay the ransom. Hackers threaten to release the encrypted data when the ransom is not paid, potentially subjecting the company to further data privacy fines. It’s just adding insult to injury and kicking organizations when they’re down. This particular approach is devastating because even the usual method of beating ransomware--restoring a data backup--won’t stop the hackers from releasing said data. It’s a tough spot to be in.

Our recommended course of action is simple: take proactive measures against ransomware before you get infected by it, as no matter what circumstances you find yourself in post-infection, it is sure to get messy and complicated.

415 IT can equip your business with the proper security measures and tools to minimize the chance of ransomware infection. Furthermore, we can help you take appropriate action in the event that you do get infected. Don’t let hackers dictate the future of your business; give us a call at (415) 295-4898.

4 Best Practices for Implementing New Technology S...
Best Practices in IT Decision Making


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 05 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Data Backup Network Security Privacy Cloud Hosted Solutions Internet IT Services Business Efficiency Data Recovery Software Managed IT Services Email Hackers Innovation Small Business User Tips Google Mobile Device Malware Phishing Hardware Cybersecurity VoIp Collaboration Communication Business Management Workplace Tips Business Continuity Cloud Computing Computer Outsourced IT Smartphone Backup Upgrade Mobile Devices Android Managed Service Quick Tips Tech Term Microsoft Windows 10 Disaster Recovery Communications Ransomware Covid-19 Smartphones Saving Money Passwords Managed Service Provider Users Paperless Office Remote Work Remote Monitoring Browser Network Internet of Things Encryption Server BDR Data Management Windows Artificial Intelligence Wi-Fi Office 365 Business Technology Social Media Managed IT Help Desk Compliance Microsoft Office Employer-Employee Relationship Holiday Windows 7 Document Management Vulnerability Government Save Money Health Healthcare Laptops Data Security Chrome Managed Services Training Information RMM Scam Facebook Virtualization Automation Remote Applications Managed IT services Blockchain Miscellaneous Vendor Management Gadgets Avoiding Downtime Project Management Wireless Antivirus Analytics Mobile Office Two-factor Authentication Bandwidth Machine Learning Redundancy VPN Meetings BYOD Current Events Processor Office Tip of the week Infrastructure Net Neutrality Employees Virtual Private Network Software as a Service IoT Regulations Employee-Employer Relationship IT Management Hard Drive Information Technology Patch Management Customer Relationship Management Apps OneDrive Storage WiFi Router HIPAA Data Loss Maintenance Time Management Proactive Remote Worker Website Password Networking Company Culture Files Access Control Mobility File Management Recovery Electronic Health Records Server Management Instant Messaging Proactive Maintenance Consulting Downtime Free Resource Tablet Payment Cards Management Voice over Internet Protocol Internet Exlporer Word Data Storage Dark Web Augmented Reality Display File Sharing Customer Service Smart Technology Assessment Managed Services Provider Mobile Device Management Data Breach Images 101 Spam Computing Telephone Remote Workers Social Network Network Management Professional Services Utility Computing Consultation Bring Your Own Device Conferencing Alert Mobile Security Vendor Remote Computing Flexibility Authentication Holidays Unified Communications Big Data Monitoring Co-Managed IT Mobile Smart Devices Recycling Unified Threat Management Remote Monitoring and Management Search Gmail Financial The Internet of Things Cooperation Operating System Risk Management Money Bluetooth WPA3 Lenovo PCI DSS Break Fix Notes Business Telephone Procurement Videos Vulnerabilities Samsung Remote Working Cyber Monday Staff Solid State Drive Virtual Machines IT Consulting Managing Stress Permissions User Management Bookmarks Biometric ROI SharePoint Procedure Nanotechnology Wires Computing Infrastructure Solid State Drives Reviews Chatbots Microsoft Excel Projects Value of Managed Services Fleet Tracking Zero-Day Threat Superfish Mirgation PowerPoint Cyberattacks Mail Merge IT Assessment Social User Error Media Mobile Computing Websites Budget Wearable Technology Star Wars Cybercrime Cyber security Credit Cards Enterprise Content Management Google Calendar Fraud Teamwork Favorites Gamification Downloads Documentation App Alerts Options End of Support Identity Theft Enterprise Resource Planning Return on Investment Geography Travel Asset Tracking Backup and Disaster Recovery CRM Cache Virtual Reality Read Only Address Digitize Security Cameras Ergonomics Shared resources Going Green SaaS MSP Finance Firewall Database Management Point of Sale Computers Tech Terms Customer Relationships Social Networking Workers Screen Reader Comparison Licensing 5G Mobile VoIP Windows Server 2008 Techology Gifts Identity Settings Personal Information Shadow IT Printing Vendors Modem High-Speed Internet Technology Tips Manufacturing Touchscreen Hacking Human Error Content Filtering Data Warehousing Virtual Assistant Bitcoin Batteries Tech Support Distributed Denial of Service GDPR E-Commerce Theft Technology Laws Innovations G Suite Legislation Heating/Cooling Emergency Outsource IT Multi-Factor Security Smart Tech Specifications Wireless Internet Outlook Electronic Medical Records Disaster Resistance Hacker Transportation Active Directory Outsourcing Printer Analysis Development Digital Payment Hotspot Trending OneNote Permission Operations Wasting Time CIO applications Statistics Authorization Peripheral IT Technicians Cost Management Managed IT Service Features IT Unified Threat Management YouTube Motherboard Chromebook Servers Politics Laptop Connectivity Black Friday Employer/Employee Relationships Apple Shortcut Optimization Proactive IT CES Windows Server Video Conferencing Private Cloud 2FA Cookies Cables Mouse Language Hard Disk Drives Sensors How To Test Banking Migration eWaste Database CEO Twitter Regulation Students Marketing Daniel Stevens Printers Battery Customer Relationship Education

Latest Blog

You may have been in a position where you tried to implement a technology solution in the past only to find that your staff is simply not responsive to it in any capacity. Maybe they do not see the value in the solution, or they do not understand what issues the solution res...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...