One-in-seven Nasdaq-100 companies ranked as highly susceptible to a ransomware attack
Over 90% of companies operate out-of-date systems, according to new report
The majority of Nasdaq-100 companies are operating out-of-date systems, and 82 percent have publicly visible ports, increasing the risk of a ransomware attack, according to a new report.
Some 92% of companies have at least one high severity vulnerability due to out-of-date systems, according to research published by IT security firm Black Kite. The company’s Ransomware Susceptibility Index also revealed that 15% of companies are highly susceptible to a ransomware incident, while 60% of Fortune 100 companies have experienced breach in the past.
Researchers calculated that the average annual financial risk of a cyber attack could cost a Nasdaq-100 company $41.3 million.
Another report, published by Cyber Security Ventures, also found that ransomware events, which tripled in 2020 compared to the previous year, are estimated to reach $20 billion in 2021. Not only are these attacks multiplying in frequency, but cybercriminals are also raising the bar by threatening to publicly release stolen data if victims do not pay the ransom, according to the report.
Bob Maley, chief security officer at Black Kite, said that threats to an organization’s third-party ecosystem are “evolving faster than ever before”.
RELATED RESOURCE
Challenging the rules of security
Protecting data and simplifying IT management with Chrome OS
“Just look at how ransomware has become an epidemic. Any business can be a target of a ransomware gang, even another gang. While preparing to become a ransomware victim is an important business strategy, it is even more important to see your ecosystem the way the bad actors do, and take actions that pre-empt the attack,” he said.
Sam Curry, chief security officer at Cybereason, told IT Pro that he was surprised the percentage of companies operating antiquated systems isn't higher. He added this was because of an ever-expanding digital footprint, the increased security risks in the past 18 months due to a massive shift to remote working due to COVID-19 and the challenges that smart, well-funded attackers present to defenders every day.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“Ransomware isn't the only risk facing corporations, but the daily headlines of more public and private entities being attacked is a reminder that no one is immune. It really doesn't matter whether you run a small operation or oversee security at a Fortune 10 company; you must face the reality that you will be hit and it's how you respond that will determine whether material damage will occur. In 2021, more companies are paying ransoms, and for many they think a payment will enable their business to return to normal,” Curry said.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Kaseya shifts from AI ‘insights’ to autonomous action with new agentic platformNews The company aims to evolve from its suite of management tools into an autonomous operating system for MSPs
-
Accenture to roll-out Copilot to 700,000+ staffNews Accenture will roll out Microsoft Copilot to nearly three quarters of a million employees after years of testing
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
