SHARE
Facebook X Pinterest WhatsApp

Why Paying After a Ransomware Attack Is Futile

Oct 12, 2016

Why Paying After a Ransomware Attack Is Futile

Why Paying After a Ransomware Attack Is FutileWhy Paying After a Ransomware Attack Is Futile

Paying up after a ransomware attack often does little good, so businesses should focus on how to continue to operate when confronted with an attack.

Ransomware Targeting SMBs More FrequentlyRansomware Targeting SMBs More Frequently

97% of respondents say ransomware attacks on small businesses (SMBs) are becoming more frequent, a trend expected to continue during the next two years.

Disconnect Between IT Service Providers and SMBsDisconnect Between IT Service Providers and SMBs

Only 34% of SMBs are highly concerned about the ransomware threat, in contrast to 88% of IT service providers.

Repetitive Ransomware AttacksRepetitive Ransomware Attacks

91% of respondents have clients who were victimized by ransomware, and 40% of them have been attacked six or more times in the last year. 31% of IT service providers have experienced many such incidents in one day.

Most Common Ransomware: CryptoLockerMost Common Ransomware: CryptoLocker

CryptoLocker is the most common strain of ransomware, with a 95% impact on SMBs. Locky follows at 38%, TeslaCrypt at 19%, and CBT Locker at 16%.

Failure to Alert AuthoritiesFailure to Alert Authorities

One-fourth of ransomware incidents are reported to the authorities.

Phishing Email Scams PrevailPhishing Email Scams Prevail

The leading cause of ransomware infection phishing email scam, followed by a lack of employee awareness.

Ransomware Outpaces DefensesRansomware Outpaces Defenses

93% of respondents report that customers are victimized despite anti-virus/anti-malware software that they have in place. Other defense measures are as follows: Email/spam filters: 77%, Patched/Updated apps: 58%, Ad/Pop-up Blockers: 21%, Cyber security training: 14%

Most Common Impact of RansomwareMost Common Impact of Ransomware

The most common impact of ransomware infection is downtime (63%), followed by lost data and lost devices (48%).

Paying Ransom Does Not Guarantee Returned DataPaying Ransom Does Not Guarantee Returned Data

7% of respondents report incidents in which end-users paid up to no avail.

Most Common OSes AffectedMost Common OSes Affected

Windows is the most common system infected by ransomware (according to 100% of respondents), followed by OS X (according to 3%). Linux and Android follow at 2% each.

Mobile Devices Unscathed So FarMobile Devices Unscathed So Far

Only 3% of respondents report seeing a ransomware infection on a mobile device or tablet.

Ransomware in the CloudRansomware in the Cloud

The cloud is far from immune to ransomware attacks. 35% of respondents say that Dropbox (70%), Office 365 (29%), and Google Apps (12%) are particular targets. Box and Salesforce trail at 6% and 3%, respectively.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.