Market Research Logo

IT Security: Leadership Guide — Dealing with Cyberextortion

IT Security: Leadership Guide — Dealing with Cyberextortion

This IDC study addresses the growing problem of cyberextortion and how to handle this rapidly growing type of cybercrime. Extortion situations are triggered when users open email attachments containing software that generates messages as well as carefully crafted displays that make demands for cash payments. IDC is also seeing an increasing number of incidents involving so-called "drive-by" ransomware: in such cases, users can infect their computers simply by clicking on a corrupt Web site as a result of responding to a deceptive message and then opening their browser to accepting corrupted codes. This study, for CIOs and senior executives dealing with enterprise security, looks at the future of ransomware and gives specific guidance on deterring this type of cybercrime.

"Cases of cyberextortion are reported only rarely because of victims' embarrassment," says Dr. Paul Strassmann, adjunct analyst with IDC's Research Network. "Instances usually involve manageable payments. Apprehension of perpetrators is always difficult because this crime frequently involves countries in which prosecution cannot be pursued."

Please Note: Extended description available upon request.


IDC Opinion
In This Study
IT Executive Program Research Agenda
Situation Overview
Types of Ransomware
Countering Ransomware
Future Outlook
Essential Guidance
Immediately
In the Next 6–18 Months
Beyond the Next 18 Months
Learn More
Related Research
Synopsis
Figure: IT Executive Program Research Agenda Themes

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report