Is Your Ransomware Recovery Strategy Stuck in the Past?

This post was originally published on IT Pro Today

2022 was fraught with ransomware attacks, from the Los Angeles Unified School District to semiconductor chip maker Nvidia. But these weren’t the first and they certainly won’t be the last. Not only are cybercriminals increasing their attacks on organizations across the U.S., they’re getting smarter about how they execute them.

According to Gartner’s “How to Respond to the 2022 Cyberthreat Landscape” report, cybercriminals are beginning to use automation with tech like human-driven bots (“hu-bots”), multichannel phishing (“mc-phishing”) and ransomware as a service that help them circumvent organizations’ cybercrime protections. In other words, at this point, ransomware attacks are no longer an “if” but a “when.”

Unfortunately, many organizations have either no cybersecurity strategies or extremely outdated protocols that will no longer keep their sensitive data safe from cyber criminals. With 83% of organizations already experiencing more than one data breach, IT leaders can’t afford to continue putting off a ransomware recovery strategy.

Here’s where to start.

Create a ransomware recovery plan that’s integrated into your organization’s overarching security practices.

Many organizations preach cybersecurity but fail to think critically about the practices that will help their unique organization quickly recover in the

Read the rest of this post, which was originally published on IT Pro Today.

Previous Post

Keeping Business on Track in Disruptive Times

Next Post

Chinese telcos relish their new role at core of digital economy