According to the Niebezpiecznik.pl portal, ransomware gangs steal huge amounts of data monthly – over 10 terabytes. To better illustrate this – 10 TB is 10,000 hours of Full HD video (each hour is about 1GB) or 2,500 hours of 4K video. It’s imaginative, isn’t it?
We know from the KPMG report “Cybersecurity Barometer 2022” that almost 2/3 of the surveyed organizations reported security breaches, and almost 1/3 admitted that they had been the victim of a ransomware attacks in the past.
Cyberattacks are common today. The most technologically advanced companies become the prey of hackers. The question today is not “if?” but “when?” there will be a cyberattack in the organization. There are no safeguards to guarantee security, making investments in security monitoring and response to cyberattacks critical. Only thanks to them it is possible to shorten the time in which an undetected hacker works with impunity in the company’s infrastructure. Time, which is currently on average over half a year and is strongly correlated with the level of losses incurred.
-Michał Kurek, Head of the Cybersecurity Team at KPMG in Poland and Central and Eastern Europe
Ransomware is nothing more than malicious software with which criminals block access to data or computer systems. Their most common motivation is quick money, so they demand a ransom from the victim in exchange for data decryption.
Ransomware attacks are becoming more common and technologically advanced, and their effects can be extremely serious for victims. It is important to protect especially company systems and data against this type of cyberattack with appropriate safeguards – starting with the simplest ones, such as regular updates, antivirus software, firewalls, as well as routine data backup.
The number of successful ransomware attacks has increased dramatically over the last few years. 60% of attacked organizations break under the pressure of cybercriminals and pay protection money.
Their victims are not only “ordinary” enterprises, but also educational institutions, and even life-saving ones.
For over a week, Polish Medical Air Rescue units across the country were unable to use their computer systems, including those crucial for its operation, such as the system for sending information about ongoing interventions, website and e-mail. The cybercriminals demanded a ransom of USD 390,000, or about PLN 1.5 million.
The target of hackers was the Institute of the Polish Mother’s Memorial Hospital in Łódź. In order to minimize the effects of the cyberattack, the hospital decided to temporarily disable its IT systems and serve patients using traditional paper documentation. This severely disrupted the normal functioning of the institution, delaying the issuance of medical records, discharge of patients and a number of other highly sensitive procedures.
Hackers encrypted access to the Electronic Document Management system at the Marshal’s Office of the Mazowieckie Voivodeship. This led to the disconnection of the project infrastructure of the Regional Node, and over 300 local government units lost access to it having to disconnect from the network. The Marshal’s Office also lost access to the personal data it administered. Their leaks and disclosure have not been officially confirmed, but the office informed that “there is a high probability that the data processed in the systems affected by the incident are in the possession of third parties.”
After breaking the security, the hackers compromised the protection of information on several hundred employees and collaborators of the university. Such sensitive personal data as names, addresses or the series and number of the ID card were exposed to the leak. The attack led to a several-day blockade of the university’s IT infrastructure, and the endangered server environment supporting the HR and payroll system had to be eliminated and rebuilt. This was made possible by the existence of a backup.
Cybercriminals attacked the system of the Silesian Card of Public Services, used, among others, to pay for parking or public transport tickets in the Metropolis of Upper Silesia and Zagłębie. The lockdown disrupted the daily lives of nearly 2 million people in the area for almost two weeks. The system was restored using daily backups, and passengers’ personal data was not at risk simply because the system did not collect it.
A cyberattack related to the violation of personal data protection rules, i.e. data theft, may entail a number of unpleasant consequences.
Preferably on external hard drives or in the cloud. Ideally – according to the 3-2-1 rule. For all data, create three copies, on two different storage media, with one copy stored off-site.
Especially if they are sent by unknown people, from suspicious domains or contain time-limited, extremely tempting offers. Avoid downloading software from dubious sources. You can use DNS protection to avoid risk.
Regularly use the latest security releases and hardware manufacturer support. Take care of the hygiene of your network and properly manage access permissions to corporate resources.
Remember to guarantee protection on all edge devices. Check what next-generation firewalls can do for you.
Make sure that your company’s cybersecurity policy knows what to do when unwanted visitors appear online.
If it is not necessary, let employees not use private devices or data carriers in the company. Their status and condition are a mystery to you, and they can easily become a source of infection. NAC systems and software capable of blocking unauthorized data carriers will effectively help in achieving this goal.
Hackers around the world are not idle, initiating about 2 million attacks a year using the latest technologies. The authors of the Accenture report “State of Cybersecurity Resilience 2021” estimated that in 2023 the global cost of cybercrime will exceed $11 trillion, to double in 2027 and reach almost $24 trillion.
It must not be forgotten that intensive digitization and the use of the network in subsequent spheres of life are associated with an increased need for continuous, active defence against cyber threats. Neglecting in the field of IT security is basically opening the door wide to our business and inviting cybercriminals to earn money at our expense. Protect yourself against them so that you don’t have to learn from your mistakes.
Do you want to be able to effectively resist a ransomware cyberattack? Talk to our experts during a free consultation and learn more about effective cyber protection.
Leave a Reply