Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Tuesday recap

NewsDealsSocialBlogsVideosPodcasts
HomeTechnologyCybersecurityNewsBackup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft
CybersecurityCIO PulseInsurance

Backup Strategies Are Working, and Ransomware Gangs Are Responding with Data Theft

•March 6, 2026
0
Help Net Security
Help Net Security•Mar 6, 2026

Companies Mentioned

Coalition for College

Coalition for College

SonicWall

SonicWall

SNWL

Fortinet

Fortinet

FTNT

Cisco

Cisco

CSCO

Citrix

Citrix

CTXS

Palo Alto Networks

Palo Alto Networks

PANW

Why It Matters

Effective backup hardening is curbing ransomware payouts, yet the surge in BEC/FTF and exposed VPNs underscores lingering attack surfaces that insurers and executives must mitigate.

Key Takeaways

  • •BEC and funds transfer fraud dominate 58% of claims
  • •Ransomware severity drops as backup recovery improves
  • •Dual extortion now 70% of ransomware claims
  • •VPN exposure triples ransomware incident likelihood
  • •Negotiators cut ransom demands by 65% on average

Pulse Analysis

The 2025 cyber‑insurance landscape is being reshaped by a dramatic rise in business email compromise and funds‑transfer fraud. Together these schemes represent more than half of all claims, driven by sophisticated social‑engineering tactics that exploit executive impersonation and compromised mailboxes. Insurers report lower average losses per incident, reflecting faster detection and improved response protocols, yet the sheer volume of BEC‑linked attacks forces organizations to invest heavily in email authentication, employee training, and real‑time transaction monitoring.

Ransomware remains a costly threat, but its financial impact is softening as firms adopt immutable, isolated backups and rigorous restore testing. Dual extortion—encrypting data while exfiltrating it—now accounts for 70% of ransomware claims, pushing victims to prioritize data governance alongside recovery. Professional negotiators are trimming ransom demands by roughly two‑thirds, but the median payment still hovers around $200,000, indicating that prevention and rapid restoration remain more economical than paying. The shift toward hardened backup architectures signals a broader industry move toward resilience rather than ransom payment.

Technical entry points continue to dictate exposure levels. Public‑facing VPNs were identified in 59% of ransomware incidents, making organizations three to four times more likely to suffer a breach. Coupled with unpatched software exploits, these vectors highlight the need for zero‑trust network designs, regular patch cycles, and multi‑factor authentication. Sector‑specific guidance—such as frequent OT backups for manufacturing and data minimization for healthcare—helps align security investments with business continuity goals, ensuring that even if data is stolen, regulatory and reputational damage stays contained.

Backup strategies are working, and ransomware gangs are responding with data theft

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...