77% of Organizations Are Unable to Access Systems or Networks Post-Ransomware Attack

The fallout after a ransomware attack is more devastating than previously thought. New data spells out what you should really expect after being hit with ransomware.

When we consider what happens after a ransomware attack, we normally think about remediation steps – recovering from backup, dealing with the data breach, addressing any public-facing issues, etc. But new data from Keeper Security’s 2021 Ransomware Impact Report highlights some of the forgotten impacts to an organization’s productivity post-attack:

  • Over three-quarters (77%) were unable to access needed systems or networks.
  • 28% of outages lasted over a week.
  • 26% of organizations were unable to fully perform job duties for at least a week.
  • 33% faced difficult learning curves around new protocols.
  • 21% were unable to access online tools and applications normally used.
  • 36% of user had limited access to IT support for non-security related issues.

According to Keeper Security, 42% of ransomware attacks begin with a phishing email, 23% from a malicious website, and 21% from a compromised password. In each of these cases, social engineering tactics are used to trick users into engaging with content in email and on the web. Users that undergo continual security awareness training are able to differentiate between legitimate and suspicious/malicious content and avoid engaging with malicious links and attachments that are the initial action that results in a ransomware attack.

It’s evident, organizations suffer materially after a ransomware attack. It’s the very reason why it’s so important to take steps to ensure one never happens in your organization.

Stu Sjouwerman
About the Author
Stu Sjouwerman (pronounced “shower-man”) is the founder and CEO of KnowBe4 Inc, a provider of the most popular Security Awareness Training and Simulated Phishing platform. A serial entrepreneur and data security expert with more than 30 years in the IT industry, Sjouwerman is the author of four books, with his latest being “Cyberheist: The Biggest Financial Threat Facing American Businesses.” Along with his CEO duties, Stu is Editor-in-Chief of Cyberheist News, an e-zine tailored to deliver IT security news, technical updates, and social engineering alerts. Stu is a four-time Inc 500 award winner and EY Entrepreneur of the Year finalist.