VentureBeat May 23, 2022
Louis Columbus

Ransomware attacks often succeed because endpoints are so over-configured with controls that they render devices unprotected. Today, software conflicts between endpoint controls jeopardize enterprise networks, quickened by endpoint agents’ accelerating decay rates. Absolute Software’s 2021 Endpoint Risk Report found that every endpoint has 11.7 security controls installed, decaying over time and creating multiple potential attack vectors.

Driven by how lucrative ransomware is, cybercriminal gangs and advanced persistent threat groups are doubling down on creating ransomware payloads and endpoint attack strategies that evade detection. Chainalysis found that $692 million in ransomware payments were made during 2020, nearly double their original estimates. Ivanti’s latest index found that there’s been a 7.6% jump in the number of vulnerabilities associated with ransomware in Q1...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Health IT, Health System / Hospital, Provider, Technology
Why ‘education is the answer’ to addressing security challenges
Platform versus Platformization: How CrowdStrike is winning the platform battle
New Cisco Hypershield aims to 'completely reimagine' security in the AI age
The aftermath of Change: Two experts on how healthcare organizations can prevent the next cyberattack
How to prepare for and minimize the impact of cyberattacks

Share This Article