article thumbnail

Ransomware, BEC and Phishing Still Top Concerns, per 2021 Threat Report

Webroot

Although cybercriminal activity throughout 2020 was as innovative as ever, some of the most noteworthy threat activity we saw came from the old familiar players, namely ransomware, business email compromise (BEC) and phishing. Here are some of the findings from the report. Read more about the hidden costs of ransomware in our eBook.

article thumbnail

3 Reasons We Forget Small & Midsized Businesses are Major Targets for Ransomware

Webroot

In our 2021 Webroot BrightCloud ® Threat Report , we found overall infection rates to be rising fastest in the healthcare, non-profit and arts/entertainment/recreation industries. In fact, the median ransom demand in 2021, according to advanced findings from our upcoming threat report, was $70,000.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 ways ransomware can cost your business (in addition to extortion)

Webroot

Our latest threat report found the average ransomware payment peaked in September 2020 at more than $230 thousand. For the complete findings from our survey and our recommendations for not encountering these hidden costs, download the full report. Download the eBook. But the ransom alone doesn’t tell the whole story.

article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

Threats abound in 2021. In 2021, we witnessed so many competing shifts, many of which we detailed early on in our 2021 BrightCloud® Threat Report. Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. Ransomware. To discover Webroot’s solutions for yourself, begin a free trial here.

article thumbnail

Hacker Personas Explained: Know Your Enemy and Protect Your Business

Webroot

As we mentioned in a previous blog , hackers come in many forms, but their methods can generally be classified into three distinct types of cybercriminals: The Impersonator – Hackers that pretend to be others, often using social engineering and human psychology to trick users.

Scams 108