Jamie Laliberte Whalen

by Jamie Laliberte Whalen

Senior Manager, Digital Content and Social Media

Posted Jul 19, 2017


Countdown to a Breach: Time, the Luxury no business can afford.

In this SlideShare presentation Mimecast experts, Bob Adams and Matthew Gardiner, demonstrate to you just how precious your time really is. Having a ransomware protection plan in place is imperative so you’re not counting down to having your company’s data encrypted and held ransom.

 The clock starts now.

Most ransomware attacks are conducted by profit-driven cybercriminals and to a lesser extent, by national states or hacktivists. 

5 Minutes

Historically, cybercriminals have stolen credit cards, intellectual property, customer data, and other digital assets with the goal of monetizing them.

This can happen in less than 5 minutes.

4 Minutes

Stealing your data directly puts the cybercriminals one step away from the goal-money. They would need to find a Black Market for your stolen credit cards, IP information, and customer data.

 This can happen in less than four minutes.

3 Minutes

This has led directly to ransomware. Instead of stealing your data and having to sell it to someone else, ransomware allows the cybercriminal to remove the “middle-man” and sell it back to its original owner.

This can happen in less than three minutes.

2 Minutes

The rise of cryptocurrencies, such as Bitcoin, and anonymity on the Internet makes this very hard to track but easy to profit from.

This can happen in less than two minutes.

1 Minute

Ransomware preys on the insufficient security practices of its victims. Cybercriminals find a weak spot and exploit it. With the rise in popularity of ransomware, breaches are becoming more sophisticated and are easier to circulate.

Are you prepared?

Happening in less than one minute in most cases.

 

Love to Learn AboutCyber Resilience for Email?

Get all the latest news, tips and articles delivered right to your inbox

Jamie Laliberte Whalen

by Jamie Laliberte Whalen

Senior Manager, Digital Content and Social Media

Posted Jul 19, 2017

You may also like:

Key Facts About Ransomware

Have you ever wondered about the key iss…

Have you ever wondered about the key issues with ransomware?… Read More >

Matthew Gardiner

by Matthew Gardiner

Senior Product Marketing Manager

Posted Oct 07, 2016

5 Types of Ransomware Scams to Monitor

Top 5 Ransomware Scams to Watch Out For …

Top 5 Ransomware Scams to Watch Out For To combat the ransom… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Jul 07, 2017

Never Be a Ransomware Hostage

What often impacts more than 100,00…

What often impacts more than 100,000 computers a day, a… Read More >

Julian Martin

by Julian Martin

Vice President Product Marketing

Posted Oct 19, 2016