Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1684162

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1684162

Inside a Ransomware Attack

PUBLISHED:
PAGES: 11 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC Perspective provides an overview of the ransomware attack from the onset of the attack to the lessons learned and mitigation. The number of organizations reporting a data loss, breach, or ransomware attack seems to be growing. With the advent of GenAI, the sophistication of attacks seems to be increasing. This points to an increasing likelihood of successful attacks. We recently had a front-row seat from the beginning to the end of a ransomware attack and its resolution at a manufacturing organization."There are pragmatic steps an organization can take that reduce the risk of an attack. As the likelihood of an attack increases, a focus on recovery can minimize the impact of an attack," says Niel Nickolaisen, adjunct research advisor for IDC's IT Executive Programs (IEP). "The shorter the time to recover, the lower the costs of an attack and the less disruption due to an attack."

Product Code: US53109425

Executive Snapshot

Situation Overview

  • The Setting
  • The Incident
  • Immediate Actions
  • Status After 24 Hours
  • Week 1
  • Week 2
  • Week 3
  • Week 4
  • The End of the Story

Advice for the Technology Buyer

Learn More

  • Related Research
  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!