{"id":7873,"date":"2023-01-04T16:17:51","date_gmt":"2023-01-04T21:17:51","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=7873"},"modified":"2025-04-03T12:00:10","modified_gmt":"2025-04-03T17:00:10","slug":"carahsoft-ransomware-on-the-rise-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/","title":{"rendered":"Ransomware on the Rise"},"content":{"rendered":"<p>News story after news story, cyberattack after cyberattack has demonstrated the rampant presence of ransomware in today\u2019s society taking down all shapes and sizes of companies in both the public and private sectors. By 2026, Gartner predicts that unstructured data storage, which is very susceptible to ransomware, will triple in size, and with that, an inevitable increase in the attack surface. Currently 80% of enterprises\u2019 data is made even more vulnerable by the number of daily users, its distributed nature across devices and servers and overall lack of secure protection.<sup>[<\/sup><a href=\"https:\/\/media.erepublic.com\/document\/Whitepaper-_A_Three_Prong_Ransomware_Strategy_-_Nasuni.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 1\"><sup>1<\/sup><\/a><sup>]<\/sup><\/p>\n<p>Experts have arrived at this bottom-line conclusion\u2014everyone is vulnerable to a ransomware attack and cybersecurity measures have become an absolute necessity, not an option.<\/p>\n<p><strong>RANSOMWARE DEFINITION<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7876 alignright\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-01.jpg\" alt=\"Carahsoft Ransomware Cybersecurity Blog Series Blog 1 Embedded Image 2023\" width=\"298\" height=\"298\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-01.jpg 298w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-01-150x150.jpg 150w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/> Ransomware is a form of extortion through malware exploiting cyber vulnerabilities to infiltrate systems and capture vital operating or private data. The cybercriminals require payment, often in the form of cryptocurrency, for the release, restoration or decryption of the files or the assurance of not blackmailing individuals with the information accessed. Only 2% of organizations within healthcare get their full data back even after paying the ransom, with the majority of organizations receiving about 65% of their information back.<sup>[<\/sup><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>]<\/sup> Currently, the situation has escalated to the point where bad actors are demanding multiple ransoms, one to restore the data and others to not publish the information on the black market.<\/p>\n<p>The primary four ways ransomware infects a system are through:<\/p>\n<ol>\n<li>Phishing emails and malicious links<\/li>\n<li>Insecure network ports, devices and services<\/li>\n<li>Backdoors left by other malware<\/li>\n<li>Network vulnerabilities such as poor password hygiene with little user authentication, too many legacy systems, missing software patches and updates etc.<sup>[<\/sup><a href=\"https:\/\/www.cisecurity.org\/insights\/white-papers\/security-primer-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 3\"><sup>3<\/sup><\/a><sup>]<\/sup><\/li>\n<\/ol>\n<p>The rise of ransomware as a service (RaaS) has increased the ease of carrying out a cyberattack with practically no technical knowledge necessary for a criminal to execute the attack.<sup>[<\/sup><a href=\"https:\/\/www.cisecurity.org\/insights\/blog\/ransomware-in-the-healthcare-sector\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 4\"><sup>4<\/sup><\/a><sup>]<\/sup> One group creates the malware program code and then sells it for other groups to initiate the attack on specific victims.<sup>[<\/sup><a href=\"https:\/\/securityintelligence.com\/articles\/health-care-ransomware-strains-hospitals-in-crosshairs\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 5\"><sup>5<\/sup><\/a><sup>]<\/sup> X-Force head Charles Henderson said these crime affiliations have created a condition in which &#8220;criminals are more collaborative than the cybersecurity industry.&#8221;<sup>[<\/sup><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252522369\/Ransomware-Evolving-threats-slow-progress\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 6\"><sup>6<\/sup><\/a><sup>]<\/sup><\/p>\n<p>All the shifts and advancements in ransomware require a frank review of the past few years and the statistics to understand the situation, properly form the best course of action and minimize the repercussions on American citizens through critical infrastructure.<\/p>\n<p><strong>RANSOMWARE LANDSCAPE<\/strong><\/p>\n<p>Ransomware has existed since 1989; however, the past two years have seen a dramatic spike in quantity and impact of cyberattacks. All areas of government, business and healthcare are susceptible regardless of their size and relative importance.<sup>[<a href=\"https:\/\/www.nextgov.com\/assets\/ransomware-threat-ngq122\/portal\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 7\">7<\/a>]<\/sup> In recent years, the landscape has changed from individual domestic hackers exploiting opportunities to organized groups of professional criminals based in and often funded by adversarial nations to strategically disrupt critical functions and achieve financial and political goals.<sup>[<\/sup><a href=\"https:\/\/www.aha.org\/center\/cybersecurity-and-risk-advisory-services\/ransomware-attacks-hospitals-have-changed\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 6\"><sup>6<\/sup><\/a><sup>]<\/sup><\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified 16 major critical sectors whose capabilities directly impact the national public health, safety, security and economy of America, most of which (14 out of 16) have fallen under heavy ransomware attack in the past two years.<sup>[<a href=\"https:\/\/www.cisa.gov\/critical-infrastructure-sectors\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 8\">8<\/a>]<\/sup> By targeting these essential infrastructures across financial, industrial, transportation and healthcare institutions, bad actors can disrupt nation-wide and global supply chains. CISA executives stress the importance of universal action to improve cybersecurity and combat the widespread ransomware threat. Because of the interconnectivity of U.S. infrastructure, they warn that if one organization is compromised, cybercriminals could gain access and infiltrate other larger vital service providers and ultimately spread out of control.<sup>[<a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/ransomware-hackers-will-still-target-smaller-critical-infrastructure-cisa-director-warns\/374953\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 9\">9<\/a>]<\/sup><\/p>\n<p>Government agencies and critical businesses are not the only groups seeking to improve through tech modernization. The ransomware landscape has changed drastically due to advances in cybercriminal activity as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7878 size-full\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4.jpg\" alt=\"Carahsoft Ransomware Cybersecurity Blog Series Blog 1 Infographic Image 2023\" width=\"2500\" height=\"1517\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4.jpg 2500w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4-300x182.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4-768x466.jpg 768w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4-2025x1229.jpg 2025w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4-640x388.jpg 640w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-1-v4-494x300.jpg 494w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/><\/p>\n<p>The timeline of these attacks has also accelerated. In 2019, the average time between the initial system infiltration to malware deployment was over two months but in 2021 it dropped 94% to an average of less than four days.<sup>[<\/sup><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252522369\/Ransomware-Evolving-threats-slow-progress\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 12\"><sup>12<\/sup><\/a><sup>]<\/sup> Every 10 seconds, a new victim is attacked by ransomware. Not only are attacks and ransom demands increasing and their deployments faster, the majority (60%) of companies do not feel prepared if their company were to be faced with a similar threat in the next 12 months.<sup>[<\/sup><a href=\"https:\/\/www.dell.com\/en-us\/dt\/data-protection\/gdpi\/index.htm#pdf-overlay=\/\/www.delltechnologies.com\/asset\/en-us\/products\/data-protection\/industry-market\/global-data-protection-index-key-findings.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 13\"><sup>13<\/sup><\/a><sup>]<\/sup> This problem is expected to continue to grow over the next decade, with ransomware cost predictions of more than $265 billion in total damage by 2031.<sup>[<\/sup><a href=\"https:\/\/info.thirdpartytrust.com\/hubfs\/03%20Guides%20and%20Ebooks\/ransomware-utilities-bitsight-thirdpartytrust.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 14\"><sup>14<\/sup><\/a><sup>]<\/sup> Agencies and organizations must evaluate their cybersecurity standing and make improvements to ensure that they can withstand these escalating attacks.<\/p>\n<p><strong>RANSOMWARE \u2014 ACTION REQUIRED<\/strong><\/p>\n<p>Contrary to public opinion, most cybercriminals do not primarily target organizations based on the perceived importance of their data, but rather the ease of access to infiltrate the system and the probability that the company will pay the ransom. Critical infrastructure in particular has an obligation to strengthen and reinforce their cybersecurity to prevent disruption and protect these vital functions for the American people. With the increasing trends, officials point to the new harsh reality that ransomware is not a question of <strong><em>if<\/em><\/strong> a company will be attacked through malware, but <strong><em>when<\/em><\/strong>. Based on the current landscape, organizations must act or risk being swept away by the growing tide of ransomware.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Carahsoft and its partners offer <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/solve\/cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2022 - Solve Page\"><strong><em>cybersecurity solutions<\/em><\/strong><\/a><strong><em> to defend against ransomware and mitigate the risks. Reach out to discover how Carahsoft can make an impact for your organization. <\/em><\/strong><strong><em>Dive deeper into how ransomware is affecting U.S. critical infrastructures such as healthcare and utilities in our Ransomware in Healthcare and Utilities Blog. Find our <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/community\/tag\/ransomware\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Bottom CTA\"><strong><em>full Ransomware Series here<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Resources:<\/strong><\/p>\n<p>[1] \u201cProtect, Detect &amp; Recover: The Three Prongs of a Ransomware Defense Strategy for Your Enterprise Files,\u201d Nasuni, <a href=\"https:\/\/media.erepublic.com\/document\/Whitepaper-_A_Three_Prong_Ransomware_Strategy_-_Nasuni.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 1\">https:\/\/media.erepublic.com\/document\/Whitepaper-_A_Three_Prong_Ransomware_Strategy_-_Nasuni.pdf<\/a><\/p>\n<p>[2] \u201cThe State of Ransomware in Healthcare 2022,\u201d Sophos, <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 2\">https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/<\/a><\/p>\n<p>[3] \u201cSecurity Primer \u2013 Ransomware,\u201d Center for Internet Security, <a href=\"https:\/\/www.cisecurity.org\/insights\/white-papers\/security-primer-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 3\">https:\/\/www.cisecurity.org\/insights\/white-papers\/security-primer-ransomware<\/a><\/p>\n<p>[4] \u201cRansomware: In the Healthcare Sector,\u201d Center for Internet Security, <a href=\"https:\/\/www.cisecurity.org\/insights\/blog\/ransomware-in-the-healthcare-sector\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 4\">https:\/\/www.cisecurity.org\/insights\/blog\/ransomware-in-the-healthcare-sector<\/a><\/p>\n<p>[5] \u201cHealth Care Ransomware Strains Have Hospitals in the Crosshairs,\u201d Security Intelligence, <a href=\"https:\/\/securityintelligence.com\/articles\/health-care-ransomware-strains-hospitals-in-crosshairs\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 5\">https:\/\/securityintelligence.com\/articles\/health-care-ransomware-strains-hospitals-in-crosshairs\/<\/a><\/p>\n<p>[6] \u201cRansomware Attacks on Hospitals Have Changed,\u201d AHA Center for Health Innovation, <a href=\"https:\/\/www.aha.org\/center\/cybersecurity-and-risk-advisory-services\/ransomware-attacks-hospitals-have-changed\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 6\">https:\/\/www.aha.org\/center\/cybersecurity-and-risk-advisory-services\/ransomware-attacks-hospitals-have-changed<\/a><\/p>\n<p>[8] \u201cCritical Infrastructure Sectors,\u201d Cybersecurity &amp; Infrastructure Security Agency, <a href=\"https:\/\/www.cisa.gov\/critical-infrastructure-sectors\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 8\">https:\/\/www.cisa.gov\/critical-infrastructure-sectors<\/a><\/p>\n<p>[9] \u201cRansomware Hackers Will Still Target Smaller Critical Infrastructure, CISA Director Warns,\u201d Nextgov, <a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/ransomware-hackers-will-still-target-smaller-critical-infrastructure-cisa-director-warns\/374953\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 9\">https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/ransomware-hackers-will-still-target-smaller-critical-infrastructure-cisa-director-warns\/374953\/<\/a><\/p>\n<p>[12] \u201cRansomware in 2022: Evolving threats, slow progress,\u201d TechTarget, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/news\/252522369\/Ransomware-Evolving-threats-slow-progress\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 12\">https:\/\/www.techtarget.com\/searchsecurity\/news\/252522369\/Ransomware-Evolving-threats-slow-progress<\/a><\/p>\n<p>[13] \u201cGlobal Data Protection Index 2021,\u201d Dell Technologies, <a href=\"https:\/\/www.dell.com\/en-us\/dt\/data-protection\/gdpi\/index.htm#pdf-overlay=\/\/www.delltechnologies.com\/asset\/en-us\/products\/data-protection\/industry-market\/global-data-protection-index-key-findings.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 13\">https:\/\/www.dell.com\/en-us\/dt\/data-protection\/gdpi\/index.htm#pdf-overlay=\/\/www.delltechnologies.com\/asset\/en-us\/products\/data-protection\/industry-market\/global-data-protection-index-key-findings.pdf<\/a><\/p>\n<p>[14] \u201cRansomware in the Utilities Sector,\u201d ThirdPartyTrust and BitSight, <a href=\"https:\/\/info.thirdpartytrust.com\/hubfs\/03%20Guides%20and%20Ebooks\/ransomware-utilities-bitsight-thirdpartytrust.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 14\">https:\/\/info.thirdpartytrust.com\/hubfs\/03%20Guides%20and%20Ebooks\/ransomware-utilities-bitsight-thirdpartytrust.pdf<\/a><\/p>\n<p><strong>Infographic Resources:<\/strong><\/p>\n<p>[7] \u201cRansomware Threat March 2022: Special Report\u201d Nextgov, <a href=\"https:\/\/www.nextgov.com\/assets\/ransomware-threat-ngq122\/portal\/\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 7\">https:\/\/www.nextgov.com\/assets\/ransomware-threat-ngq122\/portal\/<\/a><\/p>\n<p>[10] \u201cLooking Back at the Colonial Pipeline Ransomware Incident,\u201d Government Technology, <a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/looking-back-at-the-colonial-pipeline-ransomware-incident\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 10\">https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/looking-back-at-the-colonial-pipeline-ransomware-incident<\/a><\/p>\n<p>[11] \u201cMuch to Do About Ransomware: Report Highlights a Path Forward,\u201d Government Technology, <a href=\"https:\/\/www.govtech.com\/security\/much-to-do-about-ransomware-report-highlights-a-path-forward\" data-track=\"Carahsoft - Ransomware on the Rise Series Blog - 2023 - Resource 11\">https:\/\/www.govtech.com\/security\/much-to-do-about-ransomware-report-highlights-a-path-forward<\/a><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/carahsoft-ransomware-on-the-rise-blog-2023\"><\/head><\/p>\n","protected":false},"excerpt":{"rendered":"<p>News story after news story, cyberattack after cyberattack has demonstrated the rampant presence of ransomware in today\u2019s society taking down all shapes and sizes of companies in both the public and private sectors. By 2026, Gartner predicts that unstructured data &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":7877,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2],"tags":[1172,545,376],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware on the Rise | Carahsoft<\/title>\n<meta name=\"description\" content=\"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware on the Rise | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-04T21:17:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T17:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"482\" \/>\n\t<meta property=\"og:image:height\" content=\"224\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Ransomware on the Rise\",\"datePublished\":\"2023-01-04T21:17:51+00:00\",\"dateModified\":\"2025-04-03T17:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\"},\"wordCount\":1156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg\",\"keywords\":[\"CISA\",\"Cybersecurity\",\"Ransomware\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\",\"name\":\"Ransomware on the Rise | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg\",\"datePublished\":\"2023-01-04T21:17:51+00:00\",\"dateModified\":\"2025-04-03T17:00:10+00:00\",\"description\":\"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg\",\"width\":482,\"height\":224,\"caption\":\"Carahsoft Ransomware Cybersecurity Blog Series Blog 1 Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware on the Rise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware on the Rise | Carahsoft","description":"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware on the Rise | Carahsoft","og_description":"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/","og_site_name":"| Carahsoft","article_published_time":"2023-01-04T21:17:51+00:00","article_modified_time":"2025-04-03T17:00:10+00:00","og_image":[{"width":482,"height":224,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Ransomware on the Rise","datePublished":"2023-01-04T21:17:51+00:00","dateModified":"2025-04-03T17:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/"},"wordCount":1156,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg","keywords":["CISA","Cybersecurity","Ransomware"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/","name":"Ransomware on the Rise | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg","datePublished":"2023-01-04T21:17:51+00:00","dateModified":"2025-04-03T17:00:10+00:00","description":"Based on the current cybersecurity landscape, organizations must act or risk being swept away by the growing tide of ransomware.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-01.jpg","width":482,"height":224,"caption":"Carahsoft Ransomware Cybersecurity Blog Series Blog 1 Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-on-the-rise-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Ransomware on the Rise"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7873"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=7873"}],"version-history":[{"count":7,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7873\/revisions"}],"predecessor-version":[{"id":7887,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7873\/revisions\/7887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/7877"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=7873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=7873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=7873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}