
Inside a Ransomware Attack
Description
This IDC Perspective provides an overview of the ransomware attack from the onset of the attack to the lessons learned and mitigation. The number of organizations reporting a data loss, breach, or ransomware attack seems to be growing. With the advent of GenAI, the sophistication of attacks seems to be increasing. This points to an increasing likelihood of successful attacks. We recently had a front-row seat from the beginning to the end of a ransomware attack and its resolution at a manufacturing organization.“There are pragmatic steps an organization can take that reduce the risk of an attack. As the likelihood of an attack increases, a focus on recovery can minimize the impact of an attack,” says Niel Nickolaisen, adjunct research advisor for IDC’s IT Executive Programs (IEP). “The shorter the time to recover, the lower the costs of an attack and the less disruption due to an attack.”
Table of Contents
11 Pages
Executive Snapshot
Situation Overview
The Setting
The Incident
Immediate Actions
Status After 24 Hours
Week 1
Week 2
Week 3
Week 4
The End of the Story
Advice for the Technology Buyer
Learn More
Related Research
Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.