- Veeam study finds that budget rises for cyber security are not enough; Businesses need smarter resilience strategies
- Ransomware -Payments are falling but attackers change tactics faster than companies can adapt
- Falling attack speeds don’t mean ransomware is beaten
New research has revealed the extent of the recent development of ransomware that warns that it remains a dominant threat to organizations around the world.
A VEAMAM study that collected insights from 1,300 CISOs, IT leaders and security professionals throughout America, Europe and Australia found that almost three-quarters of companies were affected by ransomware in the past year.
Cyber security measures appear to have a certain effect where companies face ransomware events that fall slightly from 75% to 69% -and ransomware payments also fall as 36% of companies affected by 2024 chose not to pay, and 60% of those who paid less than half of the required ransom.
Falling attack rates are no reason for self -satisfaction
“Organizations are improving their defense against cyber attacks, yet 7 out of 10 still experienced an attack in the past year. And of those attacked, only 10% more than 90% of their data was included, while 57% were less than 50%,” said Anand Eswaran, CEO of VEEAM.
Still, companies can’t afford to relax. Larger law enforcement measures against groups such as Lockbit and Blackcat have disturbed large operations, but this has inadvertently led to an increase in smaller, independent attackers.
Businesses still need to adopt proactive defense and use anti-ransomware tools along with the best end point protection solutions.
“As the species and time of attack develops, it is important for any organization to transfer from reactive security measures to proactive data silence strategies. By adopting a proactive security method, investing investment in strong recovery solutions and promoting collaborative across departments can significantly reduce the influence of ransomware -attack,” added ESWARAN.
The increase in data to only attacks on data where hackers bypass encryption to steal private data directly is another alarming trend. In this environment, it is not enough to rely on antivirus software.
Although 69% of companies say they are prepared for an attack, this confidence is dropping sharply after an incident. Only 44% have tested backup plans and only 30% have a formal command chain in place.
Regular education, cross -team collaboration and investments in strong recovery frames are needed. Although budgets for cyber security and improvement have increased, they remain inadequate.
As a result, VEEAM advises companies to implement thorough procedures such as 3-2-1-1-0 data rule, ensuring more unchanging backups free of malware before restoration.