Skip to main content


Mulling Ransomware – Eye-Opening Cybersecurity Statistics

Cisco recently released their Annual Cybersecurity report for 2017, which revealed several statistics I thought were real eye openers. You can pick up a copy here:

Of the major findings in this document, I consider a few quite concerning, in particular:

“Spam accounts for nearly two-thirds (65 percent) of total email volume… about 8 percent to 10 percent of the global spam observed in 2016 could be classified as malicious” (Cisco, Inc).  As an IT or Finance professional, your email application sits in the foreground of your work space for most of your day.  Cisco’s researchers give credit to the recent increase in global spam to the Necurs botnet which they indicate is the primary vector for the Locky ransomware.

Oracle - Guide to Oracle Cloud: 5 Steps to Ensure a Successful Move to the Cloud
Guide to Oracle Cloud: 5 Steps to Ensure a Successful Move to the Cloud

Explore key considerations, integrating the cloud with legacy applications and challenges of current cloud implementations.

Get the Guide

Ransomware is a malicious software that blocks your access to a computer system until a ransom is paid. Locky is particularly nasty in that it encrypts information on PC or server hard drives. Hollywood Presbyterian Medical Center was a victim when Locky gained entry into the network and proceeded to encrypt data. Hospital administrators chose to pay the $17,000 ransom to obtain the decryption key so they could resume operations.

I don’t have $17,000 to spare. You probably don’t either so here are a few ideas to protect yourself personally from this kind of nastiness. These really only scratch the surface but these steps are something most people can do without too much help.

  1. Use antivirus and anti-malware software. Pay the annual subscription fees if required. Some internet service providers offer a limited number of installations of popular antivirus software that include regular updates.
  2. Don’t store important data on your PC or laptop. If you get infected, wipe and reuse.
  3. If you must store important data on your PC or laptop, keep two backups. Yes, two. I know it’s inconvenient.  Your first should be an external hard drive that is only connected when you are performing your backup.  The second should be in the cloud, for example Dropbox, OneDrive, or Google Drive.  Your cloud storage should not be automatically connected when you start your computer.  This gives the malware opportunity to spread.  Instead, only run the sync program once per day when you are performing a backup.
  4. Keep your operating system and software you use updated.  Don’t be that person who only updates when a new version is released.  That person gets infected.  Be the person who routinely applies updates to software – especially your operating system and antivirus software.

Cisco, Inc., “Cisco 2017 Annual Cybersecurity Report”, March 2017, Downloaded from

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Cris Dunn

Cris Dunn is the manager of Perficient's EPM SupportNet practice which provides direct support for applications and infrastructure surrounding many organizations' EPM software implementations. He is also an Oracle University certified instructor and teaches everything around Essbase as well as the EPM installation and configuration classes. When he is not working, you will find Cris engaged in His church serving as the treasurer, musician, nursery worker, and, when necessary, toilet scrubber.

More from this Author

Follow Us