Kaspersky report: Nearly half of employees don’t know how to respond to ransomware attacks

Despite the threat of ransomware being at an all-time high, a recent report from cybersecurity firm Kaspersky says that 45 per cent of employees in the U.S and Canada wouldn’t know how to respond to a ransomware attack. Thirty-seven per cent don’t even know what it is.

Ransomware, characterized by attackers blocking access to critical data or services (usually through strong encryption) and demanding the victim to pay a ransom to regain access, can have devastating consequences. The report from Kaspersky estimated that ransomware could cost organizations $1 million on average, and in severe cases, more than $5 million.

Related:

Minimizing risks, Cognizant hit with ransomware, and more chatter from MSPs on Reddit

Datto report says average cost of downtime due to ransomware highest in Canada

 

Primary monetary damage is just one effect of ransomware. Downtime usually spells disaster for businesses large and small and is flat out unacceptable for critical services like hospitals. Attackers often evaluate the importance of the service and capitalize on the urgency to restore service when demanding the ransom.


Research methodology

The Ransomware Revealed: Paying for the Protection of your Privacy study was conducted by research firm Opinion Matters via an online survey targeting 2,007 business employees aged 17 and older from the United States and 1,011 employees of the same age from Canada on their knowledge of ransomware in the workplace. The survey was conducted in November 2019. Not all survey results are included in this report.  

During the COVID-19 pandemic, attackers exploited public anxiety by sending malicious emails disguised as health safety information. These emails tricked their recipients into providing login credentials for financial websites, install malware on their machines, and frequently baited victims to execute ransomware programs.

According to Kaspersky, between 900,000 to 1.2 million users become targets of ransomware every six months. Also, attackers are becoming increasingly adept at sniffing out weak security systems, ambushing users at risk with surgical precision.

But everyone diverges on how to respond to a ransomware breach properly. Between Canada and the U.S., nearly 40 per cent of the survey respondents on average believe that companies should pay the ransom to retrieve personal data, but that’s partially due to employees–45 per cent of them–not knowing what other actions to take in case of an attack. And yet, 67 per cent of survey respondents would outright refuse to pay a ransom if they were to become a victim.

Most survey participants have no confidence that the attacker would return all stolen data. Source: Kaspersky.

While conceding to the attacker’s demands is the most direct way to restore operation, paying the ransom carries substantial risks and consequences. Firstly, there’s no guarantee that the attackers would keep the data anonymous or even return the data in full. Secondly, it sets a precedence and fuel motivation for future attacks.

A 2019 report by Emsisoft found that at least 966 public sector services were impacted by ransomware in 2019. Establishments like government agencies, education facilities, and healthcare providers remain especially at risk today.

How to prevent ransomware

In its survey, Kaspersky stressed that raising employee awareness on ransomware, as well as cybersecurity practices in general, is one of the best ways to prevent a ransomware attack. In case of a breach, however, Kaspersky experts recommend isolating the infected machine from network access should be the first step. They also suggest the following:

  • Never click on unverified links
  • Only open attachments from trusted emails
  • Only download information from trusted sites
  • Only install trusted security software

In addition, the Cybersecurity and Infrastructure Security Agency (CISA) recommends reporting any incident to their team immediately. Although the honesty lowers customer and investor trust in the affected company, it helps to ease future attacks by the same strain of ransomware.

The Canadian Centre for Cyber Security (CCCS) also has a number of best practices to help insulate a business from ransomware. Unsurprisingly, security awareness training for employees is listed as the foremost method. Others include keeping operating systems up to date, disable macros in Microsoft Office, and rule of least privilege, in which the employee is only granted the basic resources to complete their function.

For when the system becomes compromised, the goal shifts from prevention to mitigation. The CCCS recommends immediately isolating the device by removing it from the network, followed by identifying the strain of ransomware and wipe all data to disinfect the machine. The breach should be reported to the Canadian Anti-Fraud Center.

These basic practices have been said many times before, but as the world is staving off a deadly pandemic, digital best practices are more important than ever to help keep critical infrastructures operational. When uncertain, always consult with IT before proceeding.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Tom Li
Tom Li
Telecommunication and consumer hardware are Tom's main beats at Channel Daily News. He loves to talk about Canada's network infrastructure, semiconductor products, and of course, anything hot and new in the consumer technology space. You'll also occasionally see his name appended to articles on cloud, security, and SaaS-related news. If you're ever up for a lengthy discussion about the nuances of each of the above sectors or have an upcoming product that people will love, feel free to drop him a line at [email protected].

Related Tech News

Featured Tech Jobs

 

CDN in your inbox

CDN delivers a critical analysis of the competitive landscape detailing both the challenges and opportunities facing solution providers. CDN's email newsletter details the most important news and commentary from the channel.