Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation

What is cyber extortion, and what’s the risk to your business?

What is Cyber Extortion?

At its core, cyber extortion is a criminal tactic where hackers use ransomware—a type of malicious software that encrypts your data, making it inaccessible—until you pay a ransom. But the threat doesn’t always stop there. Cybercriminals often steal data and threaten to leak it on the dark web if their demands aren’t met. This double threat, known as double extortion, puts businesses in an even more precarious position.

The rise in cyber extortion is alarming. A 2024 report highlights that the number of victims has surged by 77% in just the past year. Small businesses are especially vulnerable, being four times more likely to be targeted than larger corporations. This is troubling, as smaller businesses often lack the resources to defend against such attacks.

Over 1,000 businesses fell victim to double extortion in the first quarter of this year alone. However, the real number is likely much higher, as many incidents go unreported, remaining hidden in what experts refer to as the "dark number."

Who is at Risk?

No business is entirely safe from cyber extortion. While all sectors are potential targets, certain industries are hit more frequently. Manufacturing, professional services, and wholesale trade are particularly vulnerable. Alarmingly, the healthcare and social assistance sectors are also seeing a significant rise in attacks despite the potential societal impacts.

Cybercriminals are strategic in their attacks, often focusing on regions with strong economic growth and common languages. For example, cyber extortion cases in the United States have spiked by 108%, reflecting the opportunistic nature of these criminals.

Protecting Your Business

The rise in cyber extortion is concerning, but there are steps you can take to safeguard your business:

  1. Back Up Your Data: Implement a robust backup strategy. Store critical data in offline or offsite locations and regularly test your backup restoration process.
  2. Update Software: To minimize vulnerabilities, ensure all your devices, especially those connected to the internet, are running the latest software.
  3. Implement Multi-Factor Authentication (MFA): Strengthen access controls by requiring multiple forms of verification before granting access. Limit user access to only the systems necessary for their roles.
  4. Patch and Vulnerability Management: Regularly update your systems to fix security vulnerabilities. Cybercriminals often exploit known weaknesses, so staying on top of patches can prevent many attacks.

Understanding cyber extortion and how it operates is crucial in preparing your business to defend against it. The key is to be proactive. If you need assistance in protecting your business, don’t hesitate to reach out.

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

Cyber extortion is a growing threat where criminals use ransomware and data theft to demand ransom from businesses and yada yada yada make sure you're making proactive protection measures essential.

Mitch Redekopp
Article Written by Mitch Redekopp

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2024 - All Rights Reserved

crossmenu