{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Johannes Dohren
Partner, Cybersecurity and Privacy, PwC Switzerland
Even if individual steps differ in detail, the course of a ransomware follows a similar logic. It can be illustrated by being divided into four phases – preparation, attack, spread and infection. In our blog series, we show these phases based on an example scenario from the perspective of a ransomware operator, and show which security measures are truly effective. Finally, we touch on the legal aspects of ransomware payments.
61% of Swiss executives expect a surge in reportable ransomware incidents in 2022.
At PwC, we help clients evaluate their ability to deal with the main cyber risks and threats of the digital world in an easy and understandable way.
If the preparations have been finished, the next step is to penetrate the network of the target company. Cybercriminals typically rely on phishing mails – for one simple reason. If more than 1,000 employees from a company are contacted there is a good chance that at least 50 of them will react to this fake e-mail, which will give the hackers access to the network. With higher-priority targets, the devices which are easily accessible are also often tested with standard access data. This procedure may sound rather complicated and laborious, but is automated as much as possible and very little needs to be done manually. The attacker gets a message as soon as a login attempt is successful or a user has reacted to a phishing e-mail, and in most cases has multiple accesses to the network of the hacked company on that same day.
We have a broad range of flexible solutions, including entire packages, to help you plan and prepare for cybersecurity incidents.
Cybercriminals often take the easiest route and attack the easiest target. The more difficult it is to attack your company, the less attractive a target it becomes. You should take some basic security measures to make yourself less attractive to hackers. This won’t give you complete security, but it does make it less likely that your company will fall victim to an attack. These security measures include the following:
#social#
At PwC, we are a community of solvers – powered by technology – committed to helping you protect everyone, and everything, you care about.