Industry Insights

Blog, Security

What Kind of Data Does Ransomware Steal?

by | Monday, June 27th, 2022

You know the term “ransomware.” It’s all over the news, and it’s because it’s a huge threat to all types of businesses, regardless of size or industry. If you want to protect your business’ future, you have to implement security measures that will allow you to not only address ransomware but prevent these attacks altogether. Depending on the type of data you store, you might find yourself more susceptible to ransomware attacks.

What is Ransomware?

Ransomware is an increasingly popular method of cyber extortion in which attackers steal data or encrypt files on a user’s PC in exchange for a ransom. More recent variants of ransomware have also threatened to leak data stolen online, further complicating the issue, as the ordinary method of responding to such an attack (restoring an offline backup) is no longer viable. These types of double-extortion attacks are viable because the types of sensitive data that tend to be stolen are often governed by compliance laws.

What the Numbers Say

A recent report examined the data stolen by ransomware gangs and discovered that certain types of data were more valuable (or at least more common) targets. Rapid7, a cybersecurity company, examined 161 ransomware attacks and found some commonalities amongst them. According to Rapid7’s analysis, the following types of data are most likely to be targeted by ransomware attacks, the bulk of which was comprised of two specific industries:

  • Financial services
    • Customer data (82%)
    • Employee personally identifiable information (59%)
  • Healthcare industries
    • Financial information (71%)
    • Customer and patient information (58%)

The common trend between both of these sectors is that the information stolen is incredibly valuable to hackers in that they can sell the information online, allowing others to impersonate or commit fraud using the personally identifiable information or financial credentials. While it’s true that these types of data were the most targeted, it should be mentioned that you should never let your guard down, even if you don’t collect data like this for your business. All data is valuable for hackers in some way, shape or form, and you should be doing what you can to protect it at all costs.

What Can You Do?

With so many threats out there, how is your business supposed to keep all of its sensitive data secure from cyberattacks? In addition to taking regular backups and maintaining them in secure off-site locations, we recommend that you take multiple approaches that all work toward the same goal: keeping attackers out of your network and monitoring your infrastructure to promptly address security discrepancies as they emerge. By taking this proactive approach, you will be more likely to halt data breaches before they can have a significant impact on your operations.

Compudata can help you implement the appropriate security measures to ensure this happens without a hitch. To learn more, contact us at 1-855-405-8889.

A Glimpse Into What Compliance Looks Like for Businesses

It’s easy to see all the reasons why you should make data regulations and compliance a priority. After all, you want to ensure you don’t violate the trust and security of your customers, as well as the integrity of your operations. If you make even one mistake, it...

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Remote Work Is Great, but There Are Some Pitfalls

Do you have employees working remotely? If you do, the real question is, are you doing everything you can to keep them productive and secure? Remote work is awesome, but it comes with its fair share of risks. Today, we get into how to competently confront them. Remote...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...

Let’s Take the Lid Off of CAPTCHA

We've officially reached the point where humans have to prove they're, well, human just to access websites. One of the most common ways to do this? CAPTCHA. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. It might sound...

Automation Isn’t Always the Best Business Option

Automation makes sense from an operations standpoint, and people see this despite the many who advocate for scaling back to save jobs. For every task that can be completed, however, less than half can be automated. When you consider all the tasks that a human might be...

More Reading from Industry Insights:

AI Search Isn’t There Yet

People do this all the time: if they don’t know an answer, they just make something up that sounds right. It turns out AI has the same bad habit. A Study Put AI Search to the Test, and It Did Not Go Well Researchers at the Tow Center for Digital Journalism (part of...

Hiring IT is Hard (Here’s How to Make It Easier)

Do you have someone on your staff who can handle most IT-related issues for your business? If not, we’re sure your organization feels it in more ways than one. The issues that come from not having IT help are only made more frustrating when it comes time to find IT...