• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Threats and Risks

One third of UK organisations would pay up for ransomware, finds Computing report

That's a six per cent rise since 2016

2017: The year the world was ransomed
2017: The year the world was ransomed
  • Computing Staff
  • @Computing_News
  • 23 November 2017
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

WannaCry and NotPetya seem to have made their mark on the UK enterprise, with the latest Computing security research report finding that a massive 31 per cent of organisations are between "quite likely" and "very likely" to pay up to crooks following a ransomware attack.

The information was revealed this morning at Computing's Enterprise Security & Risk Summit in London by Computing Technology Analyst Peter Gothard.

Gothard described this rise in willingness to pay off attacks as "a knock-on the seemingly unstoppable force of cheap and cheerful ransomware" that resulted in the widespread appearance of WannaCry and NotPetya early this year, making a particularly profound effect on the NHS.

"While the [WannaCry] ransomware was pretty unsophisticated in itself, it still managed to affect at least 81 out of 231 health trusts across the UK, either directly or indirectly," he observed.

"The National Audit Office's ensuing investigation revealed, and I quote, ‘an absence of clear guidelines' on how to carry out a plan, which seemed to ensure there'd be another attack based on the same code.

And then we got NotPetya just a little while afterwards - both based on the EternalBlue SMB exploit, and thus both capitalising on versions of the same fault."

As a comparison with 2016, when Computing asked the same question, six per cent more organisations are now willing to pay criminals to be released from a ransomware attack.

"That's may seem a small change," he said, "but if you think about - significant when discussing something this serious. And expensive."

To conclude, Gothard warned that "all indicators say that ransomware, now it's proving lucrative and scary, is not going to abate any time soon" and that while enterprise boards now appear to be sititng up and listening in the face of genuine effects and repercussions, board members still need to "digest the facts" in order to begin adequately funding CISO action against properly protecting organisations.

Click here to download the full report on which the keynote was based.

Further reading

Royal shoemaker Loake Shoes compromised in email hack
  • Hacking
  • 22 November 2017
Cloud skills gap or cloud skills crisis?
  • Cloud and Infrastructure
  • 22 November 2017
$31 million stolen from cryptocurrency start-up Tether
  • Hacking
  • 21 November 2017
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Threats and Risks
  • NotPetya
  • ransomware
  • computer security

More on Threats and Risks

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases

Home secretary Priti Patel is under fire after a bug led to the loss of 150,000 records from the Police National Computer

  • Threats and Risks
  • 15 January 2021
Microsoft patches 83 security vulnerabilities in first 2021 Patch Tuesday update
Microsoft patches 83 security vulnerabilities in first 2021 Patch Tuesday update

The vulnerabilities include a zero-day flaw that impacts the Microsoft Defender antivirus software

  • Threats and Risks
  • 13 January 2021
ElectroRAT malware used in extensive operation to drain funds from cryptocurrency wallets
ElectroRAT malware used in extensive operation to extract funds from cryptocurrency wallets

Cybercriminals employed three fake cryptocurrency-related apps to trick users into downloading the malware on their systems

  • Threats and Risks
  • 06 January 2021
Microsoft warns of Adrozek ad-injection campaign
Microsoft warns of Adrozek ad-injection campaign affecting all major browsers

Adrozek adds browser extensions which connect to the attacker's servers, modifies browser settings to inject ads, and disables security features

  • Threats and Risks
  • 11 December 2020
Half of all cyber intrusions in 2020 deployed ransomware, report
Half of all cyber intrusions in 2020 deployed ransomware, report

Financial gain is the motive behind two-thirds of attacks with 81 per cent of those using ransomware to achieve their goal says CrowdStrike report

  • Threats and Risks
  • 11 December 2020
blog comments powered by Disqus
Back to Top

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Microsoft fixes Windows 10 bug forcing restarts
Microsoft fixes Windows 10 bug forcing restarts
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter CEO defends Trump ban while Telegram purges far-right channels
Twitter CEO defends Trump ban while Telegram purges far-right channels
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading