{"id":31590,"date":"2019-05-03T03:08:55","date_gmt":"2019-05-03T07:08:55","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31590"},"modified":"2019-05-03T03:08:55","modified_gmt":"2019-05-03T07:08:55","slug":"6-takeaways-from-ransomware-attacks-in-q1","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/03\/6-takeaways-from-ransomware-attacks-in-q1\/","title":{"rendered":"6 Takeaways from Ransomware Attacks in Q1"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1912\">Jai Vijayan<\/a> &#8211; <strong>Ransomware<\/strong> attacks may be declining in number but almost every other metric related to the threat is trending upward: higher ransom payments, more downtime loss, and longer recovery time.<\/p>\n\n\n\n<p>Those are some of the findings from a new report from Coveware that studied data from <strong>ransomware<\/strong> attacks in the first quarter of 2019. Overall, victims paid more ransom money, experienced greater downtime, and took longer to recover from an attack than ever before.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/04\/cyber-security-1776319__340-1.png\" alt=\"\" class=\"wp-image-31592\" width=\"268\" height=\"189\"\/><\/figure><\/div>\n\n\n\n<p>Much of these trends were driven by an increase in <strong>ransomware<\/strong> types such as Ryuk, Bitpayment, and Iencrypted, that were used in customized, targeted attacks on large enterprises, Coveware said.<\/p>\n\n\n\n<p>&#8220;<strong>Ransomware<\/strong> is no longer a &#8216;one employee clicked an email, and their workstation is encrypted,&#8217; type of incident,&#8221; says Bill Siegel, CEO and co-founder of Coveware.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.darkreading.com\/attacks-breaches\/6-takeaways-from-ransomware-attacks-in-q1\/d\/d-id\/1334472&amp;ct=ga&amp;cd=CAEYAioTMTQ3NTY0MzU3Nzk0NzkzMTM0MjIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNEQyiioMhfbnN3JdSe2jPo0p1imnw\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jai Vijayan &#8211; Ransomware attacks may be declining in number but almost every other metric related to the threat is trending upward: higher ransom payments, more downtime loss, and longer recovery time. Those are some of the findings from <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/03\/6-takeaways-from-ransomware-attacks-in-q1\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-31590","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31590"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31590\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}