Are You Having A Technology Emergency?

JS Business Solutions Blog

JS Business Solutions has been serving the Attleboro area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Data is Stolen During a Ransomware Attack?

What Data is Stolen During a Ransomware Attack?

You can’t check the news without seeing the word “ransomware” plastered across the screen. It’s a major threat for businesses in just about any industry and of any size. In order to keep your business safe both now and into the future, you’ll have to implement adequate security measures that can put a stop to these types of threats. Of course, it’s easier said than done, especially when certain data is more likely to be targeted than others.

The Definition of Ransomware

Ransomware is an extremely dangerous threat that can encrypt files on the victim’s computer or network. The hacker then uses the encryption to extort payment from the victims in exchange for the decryption key. Recent variants of ransomware also threaten to release the stolen data online, which is notable because victims cannot simply restore a data backup to get around the encryption. These types of double-extortion tactics can be devastating due to data privacy and compliance laws.

Ransomware Statistics

It helps to know what types of data are most frequently targeted by ransomware, which is what the following report by Rapid7 aimed to showcase. According to Rapid7’s analysis, the following types of data are most likely to be targeted by ransomware attacks, the bulk of which was comprised of two specific industries:

  • Financial services
    • Customer data (82%)
    • Employee personally identifiable information (59%)
  • Healthcare industries
    • Financial information (71%)
    • Customer and patient information (58%)

You can see the trend here; most data stolen by hackers is going to be valuable information that can be sold on the online black market, and it is often data which can be used to commit fraud or impersonate users through their personally identifiable information and financial credentials. Granted, this might be the most targeted data, but this does not mean that other types of data are not equally as valuable to hackers. All data can be valuable in some capacity, so you should treat it as such.

Is Your Business Prepared?

It’s incredibly important that you protect your business in any way possible from these types of cyberattacks. One of the best ways you can do so is with a data backup system utilizing multiple off-site locations, including the cloud and secure data centers. The others require a more comprehensive and more proactive approach. The aim here is to address security issues and challenges before they become data breaches.

JS Business Solutions wants to help you make it happen. To learn more, reach out to us at (781) 715-1900.

There Are A Lot More Scams Than You May Realize
Largest DDoS Attack Ever Thwarted by Cloudflare
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, August 11 2022

Captcha Image

Latest Blog

As the technology we use in business and in life has advanced, the threats that target it have done the same and then some. Let’s take a few minutes to discuss these threats and what you need to do to protect yourself.

Latest News & Events

JS Business Solutions is proud to announce the launch of our new website at http://www.jsbusinesssolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what JS Business Solutions can do for your business.

Call Us Today
Call us today
(781) 715-1900

12 Pratt Street
Suite 103

Mansfield, Massachusetts 02048

TOP