• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security

Is Your Organization Adequately Protecting Itself From Ransomware?

With the rise in ransomware, organizations are considering ways to back up their data, according to Hornetsecurity survey.

October 13, 2021 Alyssa Borelli Leave a Comment

backup storage security
andranik123/stock.adobe.com

One of the most common cyberthreats impacting IT Professionals around the world is ransomware, a malicious program made for devices to lock data from users unless they pay a ransom.

At least one in five organizations have fallen victim to a cyberattack, while almost one in ten were forced to pay a ransom to recover data after the attack, according to a survey from Hornetsecurity.

The average downtime a company experiences after a ransomware attack is 21 days, which can be fatal for some companies, without taking into consideration the cost of the data recovery, the payment of the ransom and long-term brand damage.

The average amount of ransom payments that companies were forced to pay in 2020 was $170,404.  Over 90% of Hornetsecurity respondents who said they were attacked were able to recover data from a backup. About 9.2% were left with no choice but to pay the ransom to recover their data.

Related: Security Is A Top IT Priority, But Patch Management Needs To Catch Up

The survey also noted those who reported paying a ransom, under 12% were able to recover all their data through backups. Without access to shared data organizations are dead in the water.

“It is therefore clear that having malware protection present at all levels of the organization is essential, particularly on end-points that have easy access to servers and network storage. This is especially true for companies with employees who work remotely and rely on access to network storage via VPN, as local storage is not an option,” says Hornetsecurity.

Backups are the lifeblood of anti-ransomware strategy

If a shared drive is encrypted by malware, IT teams can recover from a recent backup without much data loss. Hornetsecurity’s survey revealed that over 17.2% of ransomware attacks on its respondents targeted backup data, revealing a loophole. If backup data is maliciously encrypted, it becomes useless as a ransomware protection method.

The most common forms of ransomware protection are end-point detection software with anti-ransomware capabilities and email filtration and threat analysis, according to the Hornetsecurity survey. Endpoint detection software scans and analyses end points like laptops, computers, mobile phone or tablets for ransomware threats and raises an alarm when there is one.

The most common source of malware is email. Employees can fall victim to ransomware through malicious attachments sent via email or other system vulnerabilities.

Education on how to prevent ransomware attacks can be lacking, according to the Hornetsecurity report. More than a quarter of organizations surveyed did not provide training to end users on how to recognize and handle potential ransomware threats.

About 22.2% of those surveyed believed that Microsoft 365 data is immune to ransomware attacks or stated they didn’t know whether it could be affected.

Despite ransomware being one of the most common type of cyber threats, only a third of businesses have insurance coverage for such attacks.

Having cyber insurance is “not a bad idea in theory, however, it may not necessarily be feasible for many organizations. Covering ransomware cases involves accounting for the entire operation of the company and may require certain preventative measures to be taken to qualify for the insurance. So, while it’s always a good idea to cover all your bases, we don’t suggest sacrificing a potential upgrade to your internal IT and backup security in favor of purchasing ransomware insurance,” says Hornetsecurity.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.