This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Report: Ransomware and what you can do about it
Part 1: The hackers and their marketplace
Part 2: How hackers find their way in
Part 3: You’ve been hacked – so what’s the plan?
Part 4: How to protect your firm from ransomware
Inflation, geopolitical turmoil and an increase in supply chain issues are creating a turbulent environment which has seen cyber crime thrive.
We hate to sound like a blatant advert for the burgeoning number of cyber security firms out there – which provide a valuable service – but it’s true that if there’s one thing for certain in uncertain times it’s that your business is more likely than not to become target of a ransomware attack.
TechInformed can’t claim to produce a report that prevents this from happening, but we can introduce you, through conversations with over 50 cyber security specialists, to your enemy, the ransomware attacker, which may help you make more informed decisions about which technologies and strategies to deploy.
This week, we’ve published reports dissecting four key aspects of a ransomware attack starting with the ransomware marketplace itself; looking at common attack surfaces; response and negotiation in the event of an attack and strategies to prevent an attack from happening.
We finish with an examination of future threats with some key predictions on how the ransomware landscape will evolve over the next couple of years.
To read TechInformed’s deepdive into ransomware, click on the links at the top of the page, starting with Part 1.
In order to create this report, TechInformed reached out across the industry for key insights into ransomware, and the response was overwhelming. We’d like to thank all of those who contributed, whether quotes were used directly or as part of our research. Please see a list of organisations that contributed below – and thanks to them for their input.
Akamai, Adarma, BlueVoyant, Canon, Censornet, Central Networks, CheckPoint, Cyberproof, Cybersmart, Cyber Risk, CYFOR, DigitalXRAID, Drawbridge, eSentire, Enpass Technologies, Exiger, Forcepoint, Forescout Security, Hamilton Barnes, Intercity, KnowBe4, KPMG, Kroll, Netacea, Noname Security, NormCyber, Nozomi Networks, Nozomi, Otka, Open Systems, Privacy Compliance Hub, Psybersafe, Qualys, Quostar, Searchlight, Secure Age, Splunk, SureCloud, S-RM, Trend Micro, Threat Quotient, Thales, Trelix, University of Nottingham IEEE group, Vectra, VIPRE, Yubico
#BeInformed
Subscribe to our Editor's weekly newsletter