Only 44% have strict requirements in place when it comes to supply chain relationships
Some attacks are avoidable, others are not
Of the 1001 UK IT managers surveyed for the research, 77% expressed a growing concern that despite their company having a good protection system in place, they could still be at risk of an attack by proxy - via their supply chain. Approximately 55% were also of the opinion that whilst some attacks are avoidable, others aren't - which underlines the opportunities for vendors and channel partners to assist customers in identifying and understanding where the very real ransomware threats lie and supporting them in protecting their businesses accordingly.
The need to take control
Across the respondents surveyed, 39% estimated it would take a week for their business to recover from a cyberattack - with 47% admitting it could take a month or more. In addition, medium and large sized businesses were most concerned about their supply chain putting them at risk (82%) yet, despite this, only 44% have a strict requirement in place when it comes to the supply chain relationships. 39% said they had a loose agreement whilst 8% don't have, or haven't even considered, one. However, 66% of businesses say they ask for regular updates from their supply chain about their measures and protection/recovery plan to tackle ransomware attacks.
The supply chain risk
Over three-quarters (77%) of all respondents were concerned about the risk from their supply chain (suppliers, clients, and partners) and that figure rises to 82% when the IT depends on outsourced IT services.
Who's getting attacked?
Looking deeper into those numbers, 69% of in-house IT teams have experienced a ransomware attack and that number rises to 88% for those with partially or fully outsourced IT.
More than half of those surveyed (56%) with fully outsourced IT services said they had also sought specific external consultancy on how to prepare for a ransomware attack. 61% of businesses with A mix of in-house and outsourced IT services said they use online backups to prepare for a ransomware attack - versus just 46% of businesses with a fully internalised IT.
"The Ransomware Index unfortunately shows that despite continued improvements in security protocols, clients remain concerned about the risks of ransomware attacks from third party IT suppliers," said
About the research.
The survey was carried out on behalf of Osirium by
About
With privileged credentials involved in over 80% of security breaches, customers rely on Osirium PAM's innovative technology to secure their critical infrastructure by controlling 3rd party access, protecting against insider threats, and demonstrating rigorous compliance. Osirium Automation delivers time and cost savings by automating complex, multi-system processes securely, allowing them to be delegated to Help Desk engineers or end-users and to free up specialist IT resources. The Osirium PEM solution balances security and productivity by removing risky local administrator rights from users, while at the same time allowing escalated privileges for specific applications.
Founded in 2008 and with its headquarters in
https://www.osirium.com/
info@osirium.com
0118 324 244
.
(C) 2021 M2 COMMUNICATIONS, source