WannaCry, NotPetya, Industroyer… Cyberattacks once again had devastating effects on companies in 2017. Far from slowing down, the threat is increasing with each passing year, as indicated in the latest report from the French Cybersecurity Agency (ANSSI). At the same time, the volume of data to be processed by companies continues to grow which makes for prime targets for hackers who are always on the prowl for ransoms. How to protect yourself against attacks, especially considering the GDPR? Let’s take a look back at the cybersecurity figures from 2017.
Ransomware: companies in the eye of the storm
According to the French Cybersecurity Agency (ANSSI), 2017 was marked by cyberattacks of unprecedented dimensions. Increasingly more sophisticated, the tools used in attacks are spreading at full throttle and have devastating effects. The proof being that hackers no longer hesitate to jeopardize software developers and suppliers in exchange for huge ransoms.
With the NotPetya attack launched in the beginning of summer 2017, public authorities were able to witness firsthand the disastrous consequences a worldwide cyberattack can have. In late 2017, Merck Group estimated losses as a result of the attack at more than 600 million dollars. Around the world, the financial consequences of ransomware is estimated at nearly 2 billion dollars- an unprecedented impact that reveals a growing threat. For example, in 2018, we have already observed an 8,500% increase in cryptojacking.
These recurrent attacks demonstrate the fragility of information systems (IS) and the significant consequences they can have on business operations. However, above all they remind us of the real need to implement cybersecurity procedures.
Further reading: EDI: is your data at risk?
The 5 fundamental axes to ensuring cybersecurity in your company
The percentage of companies falling victim to a cyberattack more than doubled between 2014 and 2016, increasing from 6.8 to 13.13%. Given the high stakes, today it is no longer possible to overlook not a single one of these axes for ensuring cyberprotection. What about you? How well is your digital system protected?
Image credit: Pxhere – Public domain