<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Who is the ideal victim from a Ransomware perspective? in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47430#M375</link>
    <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some interesting research on who exactly is the ideal victim for a ransomware attacks, and likely to be successful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/" target="_blank" rel="noopener"&gt;https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think of this research?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:58:38 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T09:58:38Z</dc:date>
    <item>
      <title>Who is the ideal victim from a Ransomware perspective?</title>
      <link>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47430#M375</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some interesting research on who exactly is the ideal victim for a ransomware attacks, and likely to be successful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/" target="_blank" rel="noopener"&gt;https://ke-la.com/the-ideal-ransomware-victim-what-attackers-are-looking-for/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you think of this research?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:58:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47430#M375</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Who is the ideal victim from a Ransomware perspective?</title>
      <link>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47432#M376</link>
      <description>&lt;P&gt;Sample size and data set seem insufficient to draw any solid conclusions.&amp;nbsp; Requests may not equal actual demand.&amp;nbsp; Seems mostly a puff piece to market services.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 00:53:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47432#M376</guid>
      <dc:creator>bkwalker</dc:creator>
      <dc:date>2021-09-10T00:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Who is the ideal victim from a Ransomware perspective?</title>
      <link>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47443#M377</link>
      <description>&lt;P&gt;A client who can pay and wants zero bad press. Same thing someone performing blackmail wants. The more devastating the news of the hack getting out and the more money or insurance the person has, the better.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 18:54:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47443#M377</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2021-09-10T18:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Who is the ideal victim from a Ransomware perspective?</title>
      <link>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47464#M378</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp; But by paying the ransom, one is acknowledging that a) you have lots of money to give away b) you don't have the incident response preparedness to deal with it, so you take the easy way instead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is until the Cybersecurity insurance company, applies conditions or add additional monetary barriers to achieve or even enforces mandatory audits until the company gets the point or c) the Cybersecurity insurance company denies them coverage as a bad organisation i.e. too risky to cover etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 12 Sep 2021 20:22:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Who-is-the-ideal-victim-from-a-Ransomware-perspective/m-p/47464#M378</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-09-12T20:22:58Z</dc:date>
    </item>
  </channel>
</rss>

