{"id":60815,"date":"2023-09-08T15:38:05","date_gmt":"2023-09-08T07:38:05","guid":{"rendered":"https:\/\/version-2.com\/?p=60815"},"modified":"2023-09-07T14:59:04","modified_gmt":"2023-09-07T06:59:04","slug":"how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/09\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\/","title":{"rendered":"How the next ransomware attack will hurt you: The numbers are in"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"60815\" class=\"elementor elementor-60815\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74bdcb7 raven-post-navigation-type-standard elementor-widget elementor-widget-raven-post-navigation\" data-id=\"74bdcb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-post-navigation\">\n\t\t\t<a href=\"https:\/\/version-2.com\/zh\/2023\/09\/mitigating-risk-data-loss-prevention-helps-prevent-security-disasters\/\" rel=\"prev\"><div class=\"raven-post-navigation-previous-post raven-post-navigation-content-wrapper\"><span class=\"raven-post-navigation-prev-arrow raven-post-navigation-arrow\"><i class=\"fas fa-arrow-left\"><\/i><\/span><div class=\"raven-post-navigation-previous-post-content raven-post-navigation-next-previous-content\"> <div class=\"raven-post-navigation-title-wrapper\"><span class=\"raven-post-navigation-prev-label raven-post-navigation-label\">Previous<\/span> <span class=\"raven-post-navigation-prev-title raven-post-navigation-title\">Mitigating risk \u2013 data loss prevention helps prevent security disasters<\/span><\/div><\/div><\/div><\/a><a href=\"https:\/\/version-2.com\/zh\/2023\/09\/creating-a-successful-remote-work-policy-examples-and-best-practices\/\" rel=\"next\"><div class=\"raven-post-navigation-next-post raven-post-navigation-content-wrapper\"><span class=\"raven-post-navigation-next-arrow raven-post-navigation-arrow\"><i class=\"fas fa-arrow-right\"><\/i><\/span><div class=\"raven-post-navigation-next-post-content raven-post-navigation-next-previous-content\"> <div class=\"raven-post-navigation-title-wrapper\"><span class=\"raven-post-navigation-next-label raven-post-navigation-label\">Next <\/span> <span class=\"raven-post-navigation-next-title raven-post-navigation-title\">Creating a successful remote work policy: examples and best practices<\/span><\/div><\/div><\/div><\/a>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\" width=\"900\" height=\"900\" \/><\/p><section><p>75% of organizations have been victims of at least one successful ransomware attack in the past year, disrupting them operationally and financially.\u00a0\u00a0<\/p><p>These attacks have become a constant battle between ever more sophisticated attackers and the IT and cybersecurity professionals tasked with keeping them at bay.\u00a0<\/p><p>In fact, <a href=\"https:\/\/www.keepit.com\/esg-study-ransomware-preparedness\/\" target=\"_blank\" rel=\"noopener\">a new survey<\/a> (co-sponsored by Keepit) tells us that 65% of those IT and cybersecurity professionals name ransomware among the top 3 threats to their organization&#8217;s viability, and 13% of those even name it the biggest threat.\u00a0<\/p><p>If you are responsible for protecting your organization\u2019s data, are you prepared for the next ransomware attack? If you are concerned about gaps in your strategy, you\u2019re not alone. Many feel their organizations do not have the proper preparation in place to handle the increase in frequency and impact of attacks. So read on, learn where attacks are being targeted, and how to increase your level of preparedness.\u00a0<\/p><p>The statistics are fresh and based on a new Enterprise Strategy Group survey of 600 European and North American IT and cybersecurity professionals personally involved with protecting against and recovering from ransomware attacks.\u00a0<\/p><p><b>Get all the latest numbers on ransomware attacks in the full report. <a href=\"https:\/\/lp.keepit.com\/esg-ransomware-study-2023\" target=\"_blank\" rel=\"noopener\">Download it for free.<\/a><\/b><\/p><\/section><section><h4><b><b>What ransomware attackers go after<\/b><\/b><\/h4><p><b>We have reliable data both on which parts of your IT environment are at risk, and which data classes the attackers are most likely to go after. So, let\u2019s take them each in turn.<\/b><\/p><\/section><section><h4><b>The parts of your IT environment most at risk<\/b><\/h4><p><b>Attackers can enter your network at many different points, placing a significant burden on IT departments. But with this data, you will have a better idea of where to strengthen your defenses.\u00a0\u00a0<\/b><\/p><p><b>\u00a0<br \/>The element most affected by ransomware attacks \u2013 indicated by 38% of survey respondents whose organization experienced a successful ransomware attack &#8211; is their <b>key IT infrastructure<\/b>. Anyone who controls even a small part of your IT infrastructure has tremendous power over you. They no longer even need to kidnap your files. For example, if they can disrupt, or gain control over, your Active Directory, they can shut your operations down for all practical purposes.\u00a0<\/b><\/p><p><b>For obvious reasons, your <b>storage systems<\/b> are also an attractive destination for attackers. Whether on-prem or in the cloud, there is a lot of gold in your data assets.\u00a0\u00a0<\/b><\/p><p><b>But the survey respondents tell us that there are also plenty of other targets under assault in their IT environments. These include <b>networks and connectivity<\/b>, <b>cloud-based data<\/b>, <b>IoT operations infrastructure<\/b>, and last but not least <b>data protection infrastructure<\/b>.<\/b><\/p><p><b>\u00a0\u00a0\u00a0<\/b><\/p><p><b>Especially the last one deserves a special mention. Ransomware attacks are increasingly targeting backup copies of data \u2013 something that 74% of survey respondents were concerned about.\u00a0\u00a0<\/b><\/p><p><b>This is why at Keepit we have gone to great lengths to <a href=\"https:\/\/www.keepit.com\/security\/secure-by-design\/\" target=\"_blank\" rel=\"noopener\">create backup solutions that eliminate this very risk<\/a> to the data protection infrastructure by insulating your backup in our independent cloud. With our true third-party protection, your data is stored in separate, isolated, immutable storage that is physically and logically separated from the rest of your IT environment. So the risk of attackers being able to reach your backups is greatly reduced.\u00a0\u00a0<\/b><\/p><p><b>While the industry is slowly realizing the importance of such \u201cair-gapped\u201d and immutable solutions, this is not common practice within the backup solutions industry just yet.\u00a0<\/b><\/p><\/section><section><h4><b>The data classes most at risk<\/b><\/h4><p><b>The data class most targeted by the attackers\u2014cited by 58% of the respondents whose organization had experienced a successful ransomware attack \u2014is the one that you are required by law to protect: <b>regulated data<\/b>. This hurts in any way you can imagine, both for you and those that entrust you with their data.\u00a0<\/b><\/p><p><b>\u00a0<br \/>But a close second is <b>sensitive infrastructure configuration data<\/b>. Affecting the infrastructure at its core is a very effective way for attackers because it makes it easier for them to steal or damage data and to evade detection.\u00a0\u00a0<\/b><\/p><p><b>In essence, this is how many attackers first gain entry. Once inside, they \u201cclimb the ladder\u201d to compromise an account with admin privileges. And then, they can start breaking things such as configuration settings and access rules, and start stealing.\u00a0\u00a0<\/b><\/p><p><b>We recently saw a brazen example of just such an attack. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/07\/mercury-and-dev-1084-destructive-attack-on-hybrid-environment\/\" target=\"_blank\" rel=\"noopener\">In this case<\/a>, attackers caused major disruptions and financial losses by compromising both on-prem and cloud-based systems. The attacker:\u00a0<\/b><\/p><ol><li><b>Entered the target network by compromising an on-premises account\u00a0<\/b><\/li><li><b>Leveraged that account to compromise the on-prem Active Directory\u00a0<\/b><\/li><li><b>Used that access to pivot to and compromise Azure AD\u00a0<\/b><\/li><\/ol><p><b>\u00a0<br \/>All of the target&#8217;s Azure storage and compute resources were deleted. If you don\u2019t have a <a href=\"https:\/\/www.keepit.com\/services\/backup-azure-ad\/\" target=\"_blank\" rel=\"noopener\">backup of your Azure AD data<\/a>, building your settings and access control up from the ground again will be difficult and time-consuming, leaving you vulnerable to further attacks in the interim.\u00a0<\/b><\/p><p><b>Other data classes the survey respondents indicated are usually targeted are <b>intellectual property data<\/b> and <b>mission-critical data<\/b>. Any attack on mission-critical data is frustrating and costly as companies struggle to restore data and operations. But temporary or permanent loss of sensitive intellectual property information is not only hurtful in the short-term until operations are resumed, but can be enormously damaging in the long-term.\u00a0<\/b><\/p><p><b>All these four types of data are highly desired by the attackers. You can see exactly how much, and a lot more, <a href=\"https:\/\/lp.keepit.com\/esg-ransomware-study-2023\" target=\"_blank\" rel=\"noopener\">in the report itself<\/a>. <\/b><\/p><p><b>As you can see, your IT infrastructure has a major bullseye on its back that bad actors constantly try to hit. Unfortunately, sometimes they will succeed. So, you had better have the right plan in place to deal with the consequences when it happens.\u00a0<\/b><\/p><\/section><section><h4><b>How the ransomware attacks hurt<\/b><\/h4><p><b>\u00a0<\/b><\/p><p><b>When asked in the survey how all those successful ransomware attacks have impacted the respondents\u2019 businesses, the two standout examples were <b>data loss<\/b> and <b>data exposure.<\/b><\/b><\/p><p><b><br \/>But the list of painful effects is long. Some worth mentioning are <b>operational disruptions<\/b>, <b>direct impact on employees, customers and partners<\/b> (such as access to personally identifiable information), and <b>financial, compliance and reputational damage<\/b>.\u00a0<\/b><\/p><p><b>If you want to know in more detail what pains to expect and prepare for, I recommend that you look through the <a href=\"https:\/\/lp.keepit.com\/esg-ransomware-study-2023\" target=\"_blank\" rel=\"noopener\">the official report.<\/a><\/b><\/p><\/section><section><h4><b><b>Storytime: Scary ransomware stories from the real world<\/b><\/b><\/h4><p><b>\u00a0<\/b><\/p><p><b>Now that you know what the attackers are after, where they hit you and what the main effects will be, let\u2019s get a bit more tangible and look at some recent examples of successful attacks.\u00a0<\/b><\/p><p><b>Ransomware attackers sure are creative, so you need to be able to anticipate their moves. And for that, it is useful to follow the related news and learn what has worked (for the attackers) in the past. <\/b><\/p><p><b>\u00a0<\/b><\/p><p><b>Here is some recommended reading to bring yourself up to date:<\/b><\/p><ul><li><b>An attack on one of Toyota&#8217;s key suppliers disrupted their production. During the shutdown, Toyota lost a third of its global output and suffered a significant financial loss. <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/toyotas-supply-chain-cyber-attack-stopped-production-cutting-down-a-third-of-its-global-output\/\">Read the story here<\/a>.\u00a0 <br \/><\/b><\/li><li><b>Third-party, unauthorized access was made at Bridgestone Americas, prompting a shutdown of the computer network and production at its factories in North and Middle for about one week. <a href=\"https:\/\/www.reuters.com\/business\/autos-transportation\/japans-bridgestone-reports-ransomware-attack-us-subsidiary-2022-03-18\/\">Read the story here<\/a>. <br \/><\/b><\/li><li><b>A ransomware attack hit agricultural equipment manufacturer AGCO, causing it to shut down manufacturing facilities. It took 17 days to return to full operation. <a href=\"https:\/\/www.bankinfosecurity.com\/black-basta-claims-responsibility-for-agco-attack-a-19146\">Read the story here<\/a>. <\/b><\/li><\/ul><\/section><section><h4><b><b>What to make of all this<\/b><\/b><\/h4><p><b>Attacks will happen, and some of them will succeed\u2014you can\u2019t stop them all. But with the right preparation, you can take a lot of the power out of the attackers\u2019 hands by being able to immediately restore the data you\u2019ve lost and clean up after the attack. So it\u2019s all about resilience and management.\u00a0\u00a0<\/b><\/p><p><b>\u00a0<br \/>Arm yourself with the right insight. The above information is a great start \u2013 you now know which data classes and elements of your IT environment to prioritize \u2014 but it only scratches the surface. Download the <a href=\"https:\/\/lp.keepit.com\/esg-ransomware-study-2023\" target=\"_blank\" rel=\"noopener\">full report<\/a> to get the full picture. <\/b><\/p><p><b>Prevention will only take you so far, so move beyond a simple defensive strategy. How much downtime and data loss can your business really afford? Ensure you can handle the disruption and keep your business operational through the storm. To help mitigate the operational disruptions and avoid the data loss that is so common-place today, you need to invest in a solid plan to protect your business-critical data.\u00a0<\/b><\/p><p><b>Now is the time to secure your data and improve your resilience levels \u2013 before the next ransomware attack hits you.<\/b><\/p><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Previous Implementing New Technology: 6 Cybersecurity T [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,853,61],"tags":[854,1076],"class_list":["post-60815","post","type-post","status-publish","format-standard","hentry","category-year2023","category-keepit","category-press-release","tag-keepit","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How the next ransomware attack will hurt you: The numbers are in - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How the next ransomware attack will hurt you: The numbers are in - Version 2\" \/>\n<meta property=\"og:description\" content=\"Previous Implementing New Technology: 6 Cybersecurity T [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T07:38:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How the next ransomware attack will hurt you: The numbers are in\",\"datePublished\":\"2023-09-08T07:38:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\\\/\"},\"wordCount\":1416,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\",\"keywords\":[\"Keepit\",\"2023\"],\"articleSection\":[\"2023\",\"Keepit\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/\",\"name\":\"How the next ransomware attack will hurt you: The numbers are in - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\",\"datePublished\":\"2023-09-08T07:38:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-ransomware-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How the next ransomware attack will hurt you: The numbers are in\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How the next ransomware attack will hurt you: The numbers are in - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/","og_locale":"zh_HK","og_type":"article","og_title":"How the next ransomware attack will hurt you: The numbers are in - Version 2","og_description":"Previous Implementing New Technology: 6 Cybersecurity T [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/","og_site_name":"Version 2","article_published_time":"2023-09-08T07:38:05+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/09\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How the next ransomware attack will hurt you: The numbers are in","datePublished":"2023-09-08T07:38:05+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/09\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\/"},"wordCount":1416,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900","keywords":["Keepit","2023"],"articleSection":["2023","Keepit","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/09\/how-the-next-ransomware-attack-will-hurt-you-the-numbers-are-in\/","url":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/","name":"How the next ransomware attack will hurt you: The numbers are in - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900","datePublished":"2023-09-08T07:38:05+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#primaryimage","url":"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900","contentUrl":"https:\/\/images.prismic.io\/keepit\/fc11317b-1fda-44f6-8977-eb4c97876a60_05-ESG+2023+ESG+Blogpage.png?auto=compress,format&amp;rect=0,0,1080,1080&amp;w=900&amp;h=900"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/esg-ransomware-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How the next ransomware attack will hurt you: The numbers are in"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-fOT","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=60815"}],"version-history":[{"count":11,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60815\/revisions"}],"predecessor-version":[{"id":71792,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/60815\/revisions\/71792"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=60815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=60815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=60815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}