Over One-Third of Companies Who Pay the Ransom are Targeted for a Second Time

Over One-Third of Companies Who Pay the Ransom are Targeted for a Second TimeDespite the somewhat logical notion that once you’ve paid the ransom, the attack is over, new data shows that paying the ransom doesn’t help you anywhere near how much you think it does.

Everyone planning for a ransomware attack has some kind of scenario in mind of how it’s going to go. Even with a solid incident response plan, this is all well and fine, but it’s necessary to take a look at industry data that spells out what the reality of organizations that have actually gone through an attack looks like.

This is what we find in the Cyber Readiness Report 2022 – Ransomware Update from U.K. cyber insurer Hiscox. In it, readers get a glimpse into how ransomware attacks start, whether they paid the ransom, and what happened after they did.

The results are a bit startling.

  • Only 59% said they successfully recovered all their data
  • 43% had to still rebuild systems, despite having the ransomware recovery key
  • 34% recovered some of their data
  • 15% said the recovery key didn’t work at all

But the story doesn’t just end there. What about the attack itself? According to the data, it’s far from being over:

  • 36% sustained a second ransomware attack
  • 29% had their data leaked
  • 19% were asked for more money by the attacker

And because 62% of Hiscox respondents said phishing emails are the most common method of entry, it’s evident that this is one of the weak spots in most organizations, and is where more effort needs to be placed to protect the organization. One of the most effective ways is through continual Security Awareness Training, which educates users on the latest scams and social engineering tactics used in these kinds of attacks.

Get Your Ransomware Hostage Rescue Manual

RansomwareHostageRescueManual-2022-FANNEDThis 26-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

  1. What is Ransomware?
  2. Am I Infected?
  3. I’m Infected, Now What?
  4. Protecting Yourself in the Future
  5. Resources

Don’t be taken hostage by ransomware. Download your rescue manual now! 

Get Your Manual

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews