{"id":29458,"date":"2022-07-15T14:37:28","date_gmt":"2022-07-15T12:37:28","guid":{"rendered":"https:\/\/www.tecsens.com\/ramnsonware-is-inevitable\/"},"modified":"2022-07-15T14:37:29","modified_gmt":"2022-07-15T12:37:29","slug":"ramnsonware-is-inevitable","status":"publish","type":"post","link":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/","title":{"rendered":"Ramnsonware is inevitable"},"content":{"rendered":"\n<p>Currently dealing with cyberattacks is a task that brings all organizations upside down as they are becoming more sophisticated and numerous. In particular, we must mention ramsonware, one of the most common among cybercriminals and that most concerns organizations. Through this attack the cybercriminal encrypts data or blocks access to prevent users from having access to them and only if they pay the ransom that is asked of them will they be returned. In the next post we tell you <strong>why ramsonware is inevitable and a report that supports this theory published Data Protection in January 2022.<\/strong><\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>Data that supports that ramsonware is inevitable<\/strong><\/h2>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p>As we have mentioned before, Data Protection <strong>conducted a survey of 3,393 organizations in January 2022, of which 76% suffered at least one ramsonware attack during 2021 and 24% managed to prevent these attacks or were not aware of having suffered it.<\/strong><\/p>\n\n<p>In this survey are organizations of all sizes small, medium even large (&gt;employed), which means that just like any other disaster (fire, flood, human error etc.) ramsonware attacks are universally pervasive in any type of company.<\/p>\n\n<p>Among the questions asked in the survey, the most noteworthy are:<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>How did ransomware enter your organization&#8217;s computing environment?<\/strong><\/p>\n\n<p>The following information was extracted from this question:<\/p>\n\n<ul class=\"wp-block-list\"><li>44% email phishing, malicious links, web etc.<\/li><li>41% infected patch, software package etc.<\/li><li>35% credential compromise.<\/li><li>32% internal threat.<\/li><li>26% critical vulnerability.<\/li><li>1% unidentified access point.<\/li><\/ul>\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Did the cybercriminal attempt to modify\/delete backup repositories as part of their ransomware attack?<\/strong><\/p>\n\n<p>The following information was extracted from this question:<\/p>\n\n<ul class=\"wp-block-list\"><li>38% some backup repositories were affected<\/li><li>30% impacted most backup repositories<\/li><li>26% tried to impact backup repositories without success<\/li><li>6% did not attempt to impact backup repositories<\/li><\/ul>\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>How long after the attack was your organization able to start restoring data from its backups?<\/strong><\/p>\n\n<p>The following information was extracted from this question:<\/p>\n\n<ul class=\"wp-block-list\"><li>55% 2-4H<\/li><li>44% 1-2H<\/li><li>35% 4-8H<\/li><li>19% 1-2 days<\/li><li>13% 15min-1H<\/li><li>11% could not restore<\/li><\/ul>\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h2 class=\"wp-block-heading\"><strong>The key to success: clean backups<\/strong><\/h2>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p><strong>Having contingency plans is essential for the continuity of any business<\/strong>, but when we talk about this type of attacks these solutions make perfect sense.<\/p>\n\n<p><strong>The key to success lies in understanding the difference between securing backup repositories and ensuring that data is clean within those repositories.<\/strong>  Protecting the repository does not guarantee that the contents of a repository are free of malware.<\/p>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/enterprise-cloud-services\/cloud-backup\/\" target=\"_blank\" rel=\"noreferrer noopener\">BaaS &amp; DRaaS Solutions<\/a><\/div>\n<\/div>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading\">In short, ramsonware attacks can only minimize their impact, but never avoiding them 100% being prepared will make a difference.<\/h3>\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.tecsens.com\/en\/contact-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Request a consultancy<\/a><\/div>\n<\/div>\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Currently dealing with cyberattacks is a task that brings all organizations upside down as they are becoming more sophisticated and numerous. In particular, we must mention ramsonware, one of the most common among cybercriminals and that most concerns organizations. Through this attack the cybercriminal encrypts data or blocks access to prevent users from having access [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":29420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[504],"tags":[162,113,463,138,392,566,382],"class_list":["post-29458","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","tag-backup-en","tag-cloud-en","tag-cloudbackup-en","tag-consultoria-en","tag-cybersecurity","tag-draas-en","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ramnsonware is inevitable - Tecsens<\/title>\n<meta name=\"description\" content=\"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ramnsonware is inevitable - Tecsens\" \/>\n<meta property=\"og:description\" content=\"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\" \/>\n<meta property=\"og:site_name\" content=\"Tecsens\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T12:37:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-15T12:37:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png\" \/>\n\t<meta property=\"og:image:width\" content=\"5334\" \/>\n\t<meta property=\"og:image:height\" content=\"3005\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TECSENS Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TECSENS Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\"},\"author\":{\"name\":\"TECSENS Marketing\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\"},\"headline\":\"Ramnsonware is inevitable\",\"datePublished\":\"2022-07-15T12:37:28+00:00\",\"dateModified\":\"2022-07-15T12:37:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\"},\"wordCount\":405,\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png\",\"keywords\":[\"backup\",\"Cloud\",\"CloudBackup\",\"Consultancy\",\"Cybersecurity\",\"draas\",\"Security\"],\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\",\"url\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\",\"name\":\"Ramnsonware is inevitable - Tecsens\",\"isPartOf\":{\"@id\":\"https:\/\/www.tecsens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png\",\"datePublished\":\"2022-07-15T12:37:28+00:00\",\"dateModified\":\"2022-07-15T12:37:29+00:00\",\"description\":\"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png\",\"width\":5334,\"height\":3005,\"caption\":\"Ramnsonware is inevitable\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.tecsens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ramnsonware is inevitable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tecsens.com\/#website\",\"url\":\"https:\/\/www.tecsens.com\/\",\"name\":\"TECSENS - Empowering companies\",\"description\":\"Sense &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/www.tecsens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tecsens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tecsens.com\/#organization\",\"name\":\"TECSENS\",\"url\":\"https:\/\/www.tecsens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"contentUrl\":\"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png\",\"width\":411,\"height\":85,\"caption\":\"TECSENS\"},\"image\":{\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/tecsens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd\",\"name\":\"TECSENS Marketing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g\",\"caption\":\"TECSENS Marketing\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ramnsonware is inevitable - Tecsens","description":"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/","og_locale":"en_US","og_type":"article","og_title":"Ramnsonware is inevitable - Tecsens","og_description":"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.","og_url":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/","og_site_name":"Tecsens","article_published_time":"2022-07-15T12:37:28+00:00","article_modified_time":"2022-07-15T12:37:29+00:00","og_image":[{"width":5334,"height":3005,"url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png","type":"image\/png"}],"author":"TECSENS Marketing","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TECSENS Marketing","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#article","isPartOf":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/"},"author":{"name":"TECSENS Marketing","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd"},"headline":"Ramnsonware is inevitable","datePublished":"2022-07-15T12:37:28+00:00","dateModified":"2022-07-15T12:37:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/"},"wordCount":405,"publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png","keywords":["backup","Cloud","CloudBackup","Consultancy","Cybersecurity","draas","Security"],"articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/","url":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/","name":"Ramnsonware is inevitable - Tecsens","isPartOf":{"@id":"https:\/\/www.tecsens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage"},"image":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png","datePublished":"2022-07-15T12:37:28+00:00","dateModified":"2022-07-15T12:37:29+00:00","description":"Dealing with cyberattacks is a complex task as they are becoming more sophisticated and numerous among them ramnsonware is inevitable.","breadcrumb":{"@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#primaryimage","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2022\/07\/TECSENS_El-ramnsonware-es-inevitable_120722-06.png","width":5334,"height":3005,"caption":"Ramnsonware is inevitable"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecsens.com\/en\/ramnsonware-is-inevitable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.tecsens.com\/en\/"},{"@type":"ListItem","position":2,"name":"Ramnsonware is inevitable"}]},{"@type":"WebSite","@id":"https:\/\/www.tecsens.com\/#website","url":"https:\/\/www.tecsens.com\/","name":"TECSENS - Empowering companies","description":"Sense &amp; Technology","publisher":{"@id":"https:\/\/www.tecsens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecsens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tecsens.com\/#organization","name":"TECSENS","url":"https:\/\/www.tecsens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","contentUrl":"https:\/\/www.tecsens.com\/wp-content\/uploads\/2017\/02\/logo@2x.png","width":411,"height":85,"caption":"TECSENS"},"image":{"@id":"https:\/\/www.tecsens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/tecsens\/"]},{"@type":"Person","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/134d9be870dd4b778a2f90367c9805bd","name":"TECSENS Marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tecsens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/89378754ae155e558af3141e6a30ab30?s=96&d=mm&r=g","caption":"TECSENS Marketing"}}]}},"_links":{"self":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/comments?post=29458"}],"version-history":[{"count":1,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29458\/revisions"}],"predecessor-version":[{"id":29459,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/posts\/29458\/revisions\/29459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media\/29420"}],"wp:attachment":[{"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/media?parent=29458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/categories?post=29458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecsens.com\/en\/wp-json\/wp\/v2\/tags?post=29458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}