Ransomware Rising
Thoughts from 170 cyber security pros
To explore experts’ experience and
attitudes on ransomware, Imperva
surveyed 170 security professionals at RSA
2017, the world’s largest gathering of cyber
security professionals. Here are the results.
Have you experienced ransomware?
of respondents’ companies had
been infected by ransomware
30%
52%
20%
17%
11%
How long were employees and
customers unable to access their
systems?
Less than 8
hours
2 - 3 days
1 day
More than 8
hours
What’s your biggest worry?
Paying the ransom
11%
Lost sales12%
Cost of downtime due to lack
of access to systems for
customers and employees59%
Bad publicity/ reduced
customer satisfaction14%
No impact4%
Would you pay to avoid downtime?
Don’t pay ransom
79% 21%
Pay ransom
What’s the estimated cost of
downtime?
44%
29%
27%
Under $5,000
$5,000 - $20,000
Over $20,000
Source:
“The real cost of ransomware is
downtime and lost productivity. What’s
more, the availability of ransomware-as-
a-service, combined with high profits for
the attackers, means ransomware attacks
are likely to escalate in 2017.”
- Terry Ray, Imperva chief product strategist
Wondering how to fight ransomware?
Insider’s Guide to Defeating Ransomware
Read
Imperva® is a leading provider of cyber
security solutions that protect business-
critical data and applications.

More Related Content

PPTX
Survey: Insider Threats and Cyber Security
PPTX
Research: From zero to phishing in 60 seconds
PPTX
Companies Aware, but Not Prepared for GDPR
PDF
Security Incident Response Readiness Survey
PPTX
The State of Ransomware 2020
PPTX
The State Of Information and Cyber Security in 2016
PPTX
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
PPTX
Imperva ppt
Survey: Insider Threats and Cyber Security
Research: From zero to phishing in 60 seconds
Companies Aware, but Not Prepared for GDPR
Security Incident Response Readiness Survey
The State of Ransomware 2020
The State Of Information and Cyber Security in 2016
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Imperva ppt

What's hot (20)

PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
The Board and Cyber Security
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
Top 5 Things to Look for in an IPS Solution
PPTX
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
PDF
M-Trends® 2013: Attack the Security Gap
PPTX
Enterprise Cyber Security 2016
PPTX
Valuing Data in the Age of Ransomware
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PPTX
Cybersecurity: How to Use What We Already Know
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
PPTX
Cyber risk tips for boards and executive teams
PDF
Must Know Cyber Security Stats of 2016
PPTX
Cyber Security Threats in the Financial Sector
PPTX
2019 Cyber Security Trends
PPTX
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
PPTX
How to Improve Threat Detection & Simplify Security Operations
PPTX
Automation: Embracing the Future of SecOps
PDF
Cyber Security for Digital-Era
Cybersecurity and Healthcare - HIMSS 2018 Survey
The Board and Cyber Security
Cyber Risk Management in 2017: Challenges & Recommendations
Top 5 Things to Look for in an IPS Solution
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
M-Trends® 2013: Attack the Security Gap
Enterprise Cyber Security 2016
Valuing Data in the Age of Ransomware
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity: How to Use What We Already Know
Orchestrate Your Security Defenses; Protect Against Insider Threats
Cyber risk tips for boards and executive teams
Must Know Cyber Security Stats of 2016
Cyber Security Threats in the Financial Sector
2019 Cyber Security Trends
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
How to Improve Threat Detection & Simplify Security Operations
Automation: Embracing the Future of SecOps
Cyber Security for Digital-Era
Ad

Similar to Rise of Ransomware (20)

PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PDF
Ransomware and tips to prevent ransomware attacks
PDF
Wombat security infographic_ransomware_june2017
PDF
How to recover from ransomware 2017
PDF
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
PPTX
The State of Endpoint Security Today
PPTX
EverSec + Cyphort: Big Trends in Cybersecurity
PDF
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
PPTX
Industry reactions to wanna cry ransomware attacks
PDF
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
PDF
True Cost of Ransomware to Your Business
PPTX
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
PPTX
Cybersecurity February Bulletin ( Ransomware Best Practice with video ).pptx
PDF
Ransomware Explained
PDF
The rise of malware(ransomware)
PDF
Ransomware: What it is and Strategies to prevent infection
PDF
Cybersecurity Trends 2018: The costs of connection
PDF
Eset trends report_2018
PPTX
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
PPTX
The Rise of Ransomware As a Service
Triangulum - Ransomware Evolved - Why your backups arent good enough
Ransomware and tips to prevent ransomware attacks
Wombat security infographic_ransomware_june2017
How to recover from ransomware 2017
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]
The State of Endpoint Security Today
EverSec + Cyphort: Big Trends in Cybersecurity
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Industry reactions to wanna cry ransomware attacks
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
True Cost of Ransomware to Your Business
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
Cybersecurity February Bulletin ( Ransomware Best Practice with video ).pptx
Ransomware Explained
The rise of malware(ransomware)
Ransomware: What it is and Strategies to prevent infection
Cybersecurity Trends 2018: The costs of connection
Eset trends report_2018
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
The Rise of Ransomware As a Service
Ad

More from Imperva (20)

PPTX
API Security Survey
PPTX
Beyond takeover: stories from a hacked account
PDF
Making Sense of Web Attacks: From Alerts to Narratives
PDF
How We Blocked a 650Gb DDoS Attack Over Lunch
PDF
7 Tips to Protect Your Data from Contractors and Privileged Vendors
PDF
SEO Botnet Sophistication
PDF
Phishing Made Easy
PDF
Imperva 2017 Cyber Threat Defense Report
PDF
Combat Payment Card Attacks with WAF and Threat Intelligence
PDF
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
PDF
Get Going With Your GDPR Plan
PDF
Cyber Criminal's Path To Your Data
PDF
Combat Today's Threats With A Single Platform For App and Data Security
PPTX
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
PPTX
Gartner MQ for Web App Firewall Webinar
PDF
More Databases. More Hackers. More Audits.
PDF
Protect Your Data and Apps in the Public Cloud
PDF
Top Cyber Security Trends for 2016
PPTX
Hackers, Cyber Crime and Espionage
PPT
The State of Application Security: Hackers On Steroids
API Security Survey
Beyond takeover: stories from a hacked account
Making Sense of Web Attacks: From Alerts to Narratives
How We Blocked a 650Gb DDoS Attack Over Lunch
7 Tips to Protect Your Data from Contractors and Privileged Vendors
SEO Botnet Sophistication
Phishing Made Easy
Imperva 2017 Cyber Threat Defense Report
Combat Payment Card Attacks with WAF and Threat Intelligence
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Get Going With Your GDPR Plan
Cyber Criminal's Path To Your Data
Combat Today's Threats With A Single Platform For App and Data Security
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Gartner MQ for Web App Firewall Webinar
More Databases. More Hackers. More Audits.
Protect Your Data and Apps in the Public Cloud
Top Cyber Security Trends for 2016
Hackers, Cyber Crime and Espionage
The State of Application Security: Hackers On Steroids

Recently uploaded (20)

PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Training Program for knowledge in solar cell and solar industry
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Basics of Cloud Computing - Cloud Ecosystem
4 layer Arch & Reference Arch of IoT.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Rapid Prototyping: A lecture on prototyping techniques for interface design
Internet of Everything -Basic concepts details
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Connector Corner: Transform Unstructured Documents with Agentic Automation
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Auditboard EB SOX Playbook 2023 edition.
Data Virtualization in Action: Scaling APIs and Apps with FME
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
MuleSoft-Compete-Deck for midddleware integrations
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj

Rise of Ransomware

  • 1. Ransomware Rising Thoughts from 170 cyber security pros
  • 2. To explore experts’ experience and attitudes on ransomware, Imperva surveyed 170 security professionals at RSA 2017, the world’s largest gathering of cyber security professionals. Here are the results.
  • 3. Have you experienced ransomware? of respondents’ companies had been infected by ransomware 30% 52% 20% 17% 11% How long were employees and customers unable to access their systems? Less than 8 hours 2 - 3 days 1 day More than 8 hours
  • 4. What’s your biggest worry? Paying the ransom 11% Lost sales12% Cost of downtime due to lack of access to systems for customers and employees59% Bad publicity/ reduced customer satisfaction14% No impact4%
  • 5. Would you pay to avoid downtime? Don’t pay ransom 79% 21% Pay ransom
  • 6. What’s the estimated cost of downtime? 44% 29% 27% Under $5,000 $5,000 - $20,000 Over $20,000
  • 7. Source: “The real cost of ransomware is downtime and lost productivity. What’s more, the availability of ransomware-as- a-service, combined with high profits for the attackers, means ransomware attacks are likely to escalate in 2017.” - Terry Ray, Imperva chief product strategist
  • 8. Wondering how to fight ransomware? Insider’s Guide to Defeating Ransomware Read
  • 9. Imperva® is a leading provider of cyber security solutions that protect business- critical data and applications.