SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
10 Ransomware Statistics
All Businesses MUST Know
An estimated 5% OF GLOBAL
SMALL-TO-MEDIUM SIZED
BUSINESSES (SMBS) FELL VICTIM
TO RANSOMWARE from 2016-2017.
GULP.
RANSOMWARE IS A
FULL-BLOWN EPIDEMIC.
Datto surveyed 1700+ IT professionals
who deal with ransomware attacks everyday.
HERE’S WHAT WE LEARNED.
97%of IT pros report that
RANSOMWARE ATTACKS AGAINST
BUSINESSES ARE OCCURRING MORE
FREQUENTLY THIS YEAR, a trend that
will continue over the next 2 years.
A WHOPPING
6 IN 7REPORT BUSINESS
CLIENTS RECENTLY ATTACKED
BY RANSOMWARE.
6 IN 10REPORT RANSOMWARE
ATTACKS IN THE 1ST
HALF OF 2017 ALONE.
An unlucky 26% REPORT MULTIPLE
RANSOMWARE ATTACKS against
SMBs in a single day. YIKES.
The most common strain of ransomware:
CryptoLocker.But new and aggressive variants pop up every single day.
While small business clients are quick to call
their IT pros when victimized by ransomware,
LESS THAN 1 IN 3 INCIDENTS
ARE REPORTED TO THE AUTHORITIES.
So what’s behind a successful
ransomware attack?
Today’s IT professionals blame
the overwhelming lack of cybersecurity
training across businesses worldwide.
How to Identify
a Phishing Scam
Lesson #1
Question:
SO, HOW BAD CAN A RANSOMWARE
ATTACK BE FOR A SMALL BUSINESS?
Answer:
75%
report a ransomware
attack has lead to
business-threatening
downtime.
57%
critical data and/or
hardware loss.
If you ask us
(or the businesses
affected) that’s just
TOO much at risk.
So, what can you do to aid in the battle
against the ransomware epidemic?
The first step: EDUCATION.
Datto’s State of the Channel Ransomware Report offers
clear insight into how much ransomware has evolved in 2017,
and what businesses can do to ensure total data protection
in 2018. To read the entire report, download it here.
REPORT
Datto’s State of the Channel
Ransomware Report

Mais conteúdo relacionado

Mais de Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!
Datto
 

Mais de Datto (20)

14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
5 Steps to Secure Google Drive
5 Steps to Secure Google Drive5 Steps to Secure Google Drive
5 Steps to Secure Google Drive
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?
 
My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!My Apps Are Fat - Not with Backupify!
My Apps Are Fat - Not with Backupify!
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

10 Ransomware Stats ALL Businesses MUST Know

  • 1. 10 Ransomware Statistics All Businesses MUST Know
  • 2. An estimated 5% OF GLOBAL SMALL-TO-MEDIUM SIZED BUSINESSES (SMBS) FELL VICTIM TO RANSOMWARE from 2016-2017. GULP. RANSOMWARE IS A FULL-BLOWN EPIDEMIC.
  • 3. Datto surveyed 1700+ IT professionals who deal with ransomware attacks everyday. HERE’S WHAT WE LEARNED.
  • 4. 97%of IT pros report that RANSOMWARE ATTACKS AGAINST BUSINESSES ARE OCCURRING MORE FREQUENTLY THIS YEAR, a trend that will continue over the next 2 years.
  • 5. A WHOPPING 6 IN 7REPORT BUSINESS CLIENTS RECENTLY ATTACKED BY RANSOMWARE.
  • 6. 6 IN 10REPORT RANSOMWARE ATTACKS IN THE 1ST HALF OF 2017 ALONE.
  • 7. An unlucky 26% REPORT MULTIPLE RANSOMWARE ATTACKS against SMBs in a single day. YIKES.
  • 8. The most common strain of ransomware: CryptoLocker.But new and aggressive variants pop up every single day.
  • 9. While small business clients are quick to call their IT pros when victimized by ransomware, LESS THAN 1 IN 3 INCIDENTS ARE REPORTED TO THE AUTHORITIES.
  • 10. So what’s behind a successful ransomware attack? Today’s IT professionals blame the overwhelming lack of cybersecurity training across businesses worldwide. How to Identify a Phishing Scam Lesson #1
  • 11. Question: SO, HOW BAD CAN A RANSOMWARE ATTACK BE FOR A SMALL BUSINESS?
  • 12. Answer: 75% report a ransomware attack has lead to business-threatening downtime. 57% critical data and/or hardware loss. If you ask us (or the businesses affected) that’s just TOO much at risk.
  • 13. So, what can you do to aid in the battle against the ransomware epidemic? The first step: EDUCATION. Datto’s State of the Channel Ransomware Report offers clear insight into how much ransomware has evolved in 2017, and what businesses can do to ensure total data protection in 2018. To read the entire report, download it here. REPORT Datto’s State of the Channel Ransomware Report