• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Insider’s guide to defending against ransomware Evaluate the real risks, costs, and strategies for IT leaders

Insider’s guide to defending against ransomware Evaluate the real risks, costs, and strategies for IT leaders

Published by: Research Desk Released: Sep 21, 2021

According to Cyber Security Ventures, global damage costs from ransomware are estimated to be more than $20 billion in 2021, up from $11.5 billion in 20191 . By the end of 2021, they expect there to be a ransomware attack every 11 seconds, up from every 14 seconds in 2019. No industry is immune to ransomware attacks. And attacks on one company’s infrastructure can halt business operations for many others. For example, in July 2021, 1,500 businesses around the world were affected by a ransomware attack focused on the U.S. information technology firm Kaseya.² Kaseya provides IT tools to other companies who outsource their information technology needs.

So when one of their tools was compromised by ransomware, hundreds of companies across five continents were forced to stop business while Kaseya got their systems back online. The threat actors reportedly demanded a $70M ransom based on the widespread nature of the attack.

Find out more how to review the best solution that will keep your backup data safe from deletion and provide the tools you need to recover quickly in the event of an attack.

Welcome Dear

Thank you for your interest and your registration with Teradata. Please confirm your e-mail address to complete your registration by clicking here

Yes, confirm my

By confirming this, you give Teradata your consent to send you information on our data analytics products and services or invitations to events and webinars by e-mail from time to time. You can revoke this consent at any time by clicking on the unsubscribe link at the bottom of each of our e-mails. We assure you that we treat your contact details with the utmost care. Detailed information on how we store and use your personal data or how you can exercise your rights regarding your personal data can be found in the global Teradata Privacy Policy.