Remove 2020 Remove Backups Remove Phishing Remove Threat Reports
article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. By September 2020, the average ransom payment peaked at $233,817. “In

article thumbnail

Report: Phishing Attacks Sustain Historic Highs

Webroot

Phishing attacks sustain historic highs. In their latest report, IDG and the pros behind Carbonite + Webroot spoke with 300 global IT professionals to learn the current state of phishing. Luckily, the report details how to fight back. Phishing capitalizes on COVID. Consequences of phishing. of attacks.

Phishing 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This World Backup Day, Our Customers Do the Talking

Webroot

Are you taking the pledge this World Backup Day? Now in its tenth year, World Backup Day remains one of our favorite reminders of the risks of not backing up the data we hold dear. Numbers are great, and necessary for showing the scope of the problem, but I wanted to see how data loss—and backups—affect real people.

Backups 62
article thumbnail

The Latest Cybersecurity Statistics 2020 By Category

Spinone

Cybersecurity professionals are not standing still for these threats and try to address them properly. In some sense, 2020 was special—the coronavirus pandemic and the global shift to remote working became significant factors affecting the cybersecurity landscape. How exactly? Let’s find out.

article thumbnail

How IT Will Prevail in the 2021 Cyber-Demic

Webroot

While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. Recent trends in ransomware back up these insights.

Backups 95
article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

An impersonation attack recently made headlines with the 2020 Twitter/Bitcoin scam , in which 130 high-profile Twitter accounts were compromised by outside parties to steal bitcoin. This is why a multi-layered approach that can block phishing sites (including HTTPS) in real time, is key for staying safe. Who is the Impersonator?

Scams 108
article thumbnail

Access Management is Essential for Strengthening OT Security

Thales Cloud Protection & Licensing

This is certainly an option for organizations with well-defined backup and remediation processes. However, and despite receiving notable attention, only 56% of healthcare companies have formal ransomware response plans, reports the Thales 2022 Data Threats Report. NEW Cooperative refused to pay the $5.9 Healthcare sector.