Cloud Security

63% of organizations paid the ransom last year

63% of organizations paid the ransom last year
Written by ga_dahmani
63% of organizations paid the ransom last year

A record 71% of organizations were hit by successful ransomware attacks last year, according to a CyberEdge Group report, up from 55% in 2017. Of victims, 63% paid the ransom demanded, up from 39% in 2017.

organizations with successful ransomware attacks

As for why more organizations today, such as Colonial Pipeline, CNA Financial and JBS Holdings, are paying ransoms, there are three explanations:

  • Threat of exposing exfiltrated data. Most modern ransomware attacks not only encrypt compromised data, but also leak it. Failure to pay a ransom can, and has, resulted in the public exposure of highly sensitive data, to the embarrassment of its victims.
  • Lower recovery cost. Many organizations find that paying a ransom is significantly less expensive than bearing the high cost of system downtime, customer outages, and potential lawsuits stemming from publicly exposed sensitive data.
  • Increased Confidence for Data Recovery. 72% of victims who paid the ransom got their data back last year, up from 49% in 2017. This increased confidence in successful data recovery is often factored into the decision to pay the ransom.

“These days, falling victim to ransomware is more a matter of ‘when’ than ‘if,'” he says. Steve Piper, CEO of the CyberEdge Group. “Deciding whether to pay a ransom is not easy. But if you plan ahead and carefully, that decision can be made long before a ransomware attack. At a minimum, a decision framework must be in place so that precious time is not wasted as the ransom payment deadline approaches.”

People’s problems persist

Each year, CyberEdge asks respondents to rate potential inhibitors that prevent them from adequately defending their organizations from cyber threats. This year, “lack of qualified personnel” and “low safety awareness among employees” were the top-rated concerns, as they have been for the past three years. In other words, the two biggest persistent problems are not related to budget or technology, but to people.

According to this year’s report, 84% of responding organizations experience a shortage of qualified IT security personnel. IT security administrators (41%), IT security analysts (33%), and IT security architects (32%) are in highest demand.

In addition, too many organizations teach their employees how to evade email and web-based cyber threats when they are hired, but fail to follow up with additional regular training to reinforce lessons learned. This oversight poses a huge risk to organizations, as most data breaches come from poorly trained employees.

Additional Key Findings

The report threw up dozens of additional ideas, including:

  • Increased spending on security. A staggering 83% of responding organizations are experiencing growth in their security budgets, up from 78% last year. The average security budget has grown by 4.6% in 2022, compared to 4.0% in 2021.
  • The most advanced security technology for 2022. CyberEdge tracks security organizations’ current and planned investments in five technology categories. Among the most sought-after security technologies in 2022 are next-generation firewalls (network security), deception technology (endpoint security), bot management (application and data security), advanced security analytics (management and security operations) and biometrics (identity). and access management).
  • This year’s weakest links. Mobile devices, industrial control/supervisory control and data acquisition (ICS/SCADA) systems, and Internet of Things (IoT) devices top this year’s list of IT components that are most difficult to protect .
  • Look at those APIs. Solutions to secure application programming interfaces (APIs) are adopted by nearly two-thirds (64%) of organizations.
  • PII and credentials at risk. Among attacks on web and mobile applications, harvesting of personally identifiable information (PII) and account takeover (ATO) attacks are the most frequent and worrying.
  • Hybrid cloud security issues. “Detecting unauthorized use of applications” (46%) and “detecting and responding to cyber threats” (45%) top the list of hybrid cloud security challenges.
  • Specialty Certifications in Demand. 99% of research participants agreed that earning an IT security specialty certification would boost their careers. Cloud security and software security topped the list of most in-demand specialty certifications.
  • Application and data security integration. “Improved cloud security posture” and “improved security incident investigations” were cited as the main benefits achieved by integrating application and data security into a unified platform.
  • Protecting work from home (WFH). To protect employees who work from home, security teams rely on antivirus and VPN products, as well as SD-WAN, network access control (NAC), and mobile device management (MDM) solutions.
  • Embrace emerging technologies. The vast majority of organizations have adopted emerging security technologies such as SD-WAN (82%), zero-trust network architectures (77%), and Security Access Services Edge (SASE) (73%).

About the author


Leave a Comment