VendorsIllumio & Ponemon Institute
Illumio & Ponemon Institute
Cybersecurity reports and statistics published by Illumio & Ponemon Institute
0 categories1 reports
Research Reports
Reports and publications from Illumio & Ponemon Institute
Recent Statistics & Reports
Only 28% of respondents said their organisations informed law enforcement when they were hit by ransomware.
1/1/2025
Data exfiltration was the most common tactic used by ransomware groups to exert pressure (47%), followed by DDoS attacks (45%), data encryption (43%), and communicating with stakeholders/customers (34%).
1/1/2025
The proportion of respondents reporting a significant revenue loss as a result of a ransomware attack nearly doubled from 22% in 2021 to 40% in 2024.
1/1/2025
Motivations for paying a ransom included: Not wanting data leaked (47%), inability to afford downtime (47%), having cyber insurance (41%), and all of the above (40%).
1/1/2025
Phishing was the most common way of delivering ransomware, accounting for 45% of incidents. This is a slight fall compared to 2021, when phishing was used in 48% of ransomware attacks. The next most common methods were remote desktop protocol (RDP) compromises (32%) and exploiting software vulnerabilities (19%).
1/1/2025
35% of organisations experienced brand damage as a consequence of a ransomware attack in 2024, up from 21% in 2021.
1/1/2025
In 2021, organisations spent an average of 190 hours and had 14 staff and third parties involved in containment and remediation, costing an average of $168,910.
1/1/2025
58% of organisations hit by ransomware in 2024 were forced to shut down operations to recover. This is an increase from 45% in 2021.
1/1/2025
Containment and remediation of a ransomware attack in 2024 took an average of 132 hours and involved an average of 17.5 staff and third parties, resulting in an average cost of $146,685.
1/1/2025
51% of ransomware victims paid a ransom demand.
1/1/2025
40% said that the data was still leaked following payment.
1/1/2025
Of the 49% of ransomware victims that did not pay a ransom, the main reasons were: compromised data wasn't critical (49%), having an effective backup strategy (48%), company policy (47%), lack of trust in the provision of a decryption key (46%), and law enforcement advice (40%).
1/1/2025
The primary reasons for not reporting these incidents were unwanted publicity (39%), being up against a payment deadline (38%), fear of retaliation (38%), and not believing the extortion demand was exorbitant (24%).
1/1/2025
52% of respondents said systems with unpatched vulnerabilities are targeted for lateral movement and privilege escalation, a significant rise from 33% in 2021.
1/1/2025
32% revealed the attackers demanded further payment or threatened more attacks.
1/1/2025
Only 13% of respondents said all impacted data was recovered after paying a ransom.
1/1/2025