Organizations should prepare for a surge in ransomware attacks during holidays, weekends, and major corporate events, when cybersecurity staffing is its weakest.
Semperis, a leading provider of AI-powered identity security and cyber resilience, released results from a global ransomware study underscoring that the majority of ransomware attacks continue to occur on holidays and weekends, when cybersecurity staffing is reduced. In addition, the study shows ransomware groups also intensify their attacks during corporate material business events, including mergers, acquisitions, IPOs, and layoffs, to exploit organizational disruption and reduced security focus.
“Threat actors continue to take advantage of reduced cybersecurity staffing on holidays and weekends to launch ransomware attacks. Vigilance during these times is more critical than ever because the persistence and patience attackers have can lead to long lasting business disruptions,” said Chris Inglis, the first U.S. National Cyber Director and Semperis Strategic Advisor. “In addition, corporate material events such as mergers and acquisitions often create distractions and ambiguity in governance and accountabilityโexactly the environment ransomware groups thrive on.”
Also Read:ย CIO Influence Interview with Duncan Greatwood, CEO at Xage Security
Key Ransomware Report Findings
Reasons for reducing SOC staffing on holidays and weekends.
62%ย of organizations want to provide employees with work/life balance,ย 47%ย reported their business is closed on holidays and weekends andย 29%ย did not think they would be attacked.
Ransomware gangs will attack during corporate material events.
60%ย of ransomware attacks took place after a material corporate event and of those attacked after such an event,ย 54%ย of companies reported being targeted following a merger or acquisition.
ITDR plans prioritize detection over response and recovery.
Identity threat detection and response (ITDR) plans gain traction, withย 90%ย of respondents reporting that their plans detect identity system vulnerabilities. However, onlyย 45%ย of plans include remediation procedures, and onlyย 63%ย automate identity system recovery.
Catch more CIO Insights:ย The CIOโs Role In Data Democracy: Empowering Teams Without Losing Control
[To share your insights with us, please write toย psen@itechseries.com ]

