IT Security: Leadership Guide — Dealing with Cyberextortion
This IDC study addresses the growing problem of cyberextortion and how to handle this rapidly growing type of cybercrime. Extortion situations are triggered when users open email attachments containing software that generates messages as well as carefully crafted displays that make demands for cash payments. IDC is also seeing an increasing number of incidents involving so-called "drive-by" ransomware: in such cases, users can infect their computers simply by clicking on a corrupt Web site as a result of responding to a deceptive message and then opening their browser to accepting corrupted codes. This study, for CIOs and senior executives dealing with enterprise security, looks at the future of ransomware and gives specific guidance on deterring this type of cybercrime.
"Cases of cyberextortion are reported only rarely because of victims' embarrassment," says Dr. Paul Strassmann, adjunct analyst with IDC's Research Network. "Instances usually involve manageable payments. Apprehension of perpetrators is always difficult because this crime frequently involves countries in which prosecution cannot be pursued."Please Note: Extended description available upon request.