Ransomware Hit 64% of Higher Ed Institutions Globally in 2021, Sophos Survey Finds

Higher Ed Was Slowest of all Sectors to Recover, State of Ransomware Report Says

data recovery methods used

Cybersecurity firm Sophos today released its annual State of Ransomware report showing ransomware attacks nearly doubled in 2021 from the year before, according to results of a survey of 5,600 IT professionals across many sectors.

Across all sectors surveyed, 66% of respondents said their organizations were hit with ransomware in 2021, up from 37% in 2020. Among higher ed institutions included in the survey, 64% of higher ed IT professionals responding, representing 410 institutions, said they were a victim of ransomware last year.

Higher ed institutions hit by ransomware were the slowest to recover of the sectors surveyed, as well, the Sophos survey found. Two in five respondents among higher ed institutions said recovery took more than a month.

The average ransom payout of $812,360 across all sectors occurred in attacks where the threat actors encrypted the victims’ data; that average ransom amount was nearly five times higher than the average in 2020, with a 300% increase in the proportion of organizations paying ransoms of $1 million or more, Sophos said.

Key Findings among Higher Ed Respondents:

  • 64% of higher ed respondents, equaling 410 higher education institutions, were hit by ransomware in 2021.
  • 50% of higher ed institutions hit by ransomware paid a ransom.
    • Among higher ed institutions that paid a ransom, paying the ransom resulted in restoration of about 61% of their data, they reported.
  • 70% of higher ed institutions hit by ransomware used backups to restore at least some of their data.
  • 100% of higher ed institutions hit by ransomware reported that cyberinsurance covered at least some of the resulting costs.
    • 87% of higher ed institutions hit by ransomware reported that cyberinsurance paid the clean-up costs.
    • 36% of higher ed institutions hit by ransomware reported that cyberinsurance paid the ransom.
    • 20% of higher ed institutions hit by ransomware reported that cyberinsurance paid other costs associated with recovery.

The survey, conducted by research agency Vanson Bourne, was conducted during January and February 2022, according to Sophos.

“As ransomware has become more prevalent, organizations have got better at getting at dealing with the aftermath of an attack,” Sophos’ report said. “Almost all organizations hit by ransomware in the last year (99%) now get some encrypted data back, up slightly from 96% last year.”

Key Findings about Restoring Data

  • The No. 1 method used to restore data is backups, used by 73% of respondents whose data was encrypted.
  • 46% reported that they paid the ransom to restore data.
  • Almost half (44%) of the respondents whose organization’s data had been encrypted used multiple methods to restore data.
  • Organizations that paid got back only 61% of their data on average.
  • Only 4% of those that paid the ransom got all their data back in 2021, down from 8% in 2020.

A Warning for Relying on Backups & CyberInsurance

Of the respondents who said they weren’t hit by ransomware in 2021 and they don’t expect to be hit in the future, 72% are relying on measures that will not prevent a ransomware attack, Sophos noted: 57% of these respondents cited backups and 37% cited cyberinsurance, with some selecting both options. “While these elements help you recover from an attack, they don’t prevent it in the first place,” the report said.

Almost all the respondents, or 94%, said the process for securing cyberinsurance had become more laborious over the last year.

“As the cyber insurance market hardens and it becomes more challenging to secure cover, 97% of organizations that have cyber insurance have made changes to their cyber defense to improve their cyber insurance position,” the report said.

ConvergeOne, a nationwide provider of cybersecurity services and digital infrastructure, told Campus Technology in January that education organizations renewing or shopping for cyberinsurance this year can expect potential insurers to conduct an in-depth analysis of the organization’s network security before a policy can be purchased.

ConvergeOne Senior Director of Cybersecurity Chris Ripkey said education institutions without mature security systems in place will no longer be able to use their cyberinsurance policies as a “get of jail free card” when cyberattacks occur.

Education organizations shopping for or renewing their cyberinsurance, he said, can expect to be asked to demonstrate that they have the following protections, at a minimum, in place:

  • Multi-factor authentication
  • Antivirus and malware protection
  • A mature data privacy program to protect student and staff information
  • A robust patch management system
  • A managed endpoint detection and response services
  • Immutable backups separate from the rest of the infrastructure

“The cyberinsurance brokers will ask for all this information in a self-assessment, and if you don’t meet the minimum requirements, they are not going to insure your district, or your premiums are going to be a lot higher,” Ripkey emphasized. “Our advice is to do your own full assessment before shopping for insurance — take stock of your security practices and where you stand.”

Read the full cyberinsurance report to learn more about changes in the cyberinsurance landscape.

The State of Ransomware survey results can be downloaded at the Sophos website.

Featured

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • glowing AI brain composed of geometric lines and nodes, encased within a protective shield of circuit patterns

    NIST's U.S. AI Safety Institute Announces Research Collaboration with Anthropic and OpenAI

    The U.S. AI Safety Institute, part of the National Institute of Standards and Technology (NIST), has formalized agreements with AI companies Anthropic and OpenAI to collaborate on AI safety research, testing, and evaluation.

  • Anthropic Announces Claude 3.5 Sonnet, First of Three 3.5 Releases

    Anthropic has introduced a new member of its Claude LLM family: Claude 3.5 Sonnet, the first release in the forthcoming Claude 3.5 product line.

  • Orchestrating AI Change with an AI Maestro

    As AI is integrated across institutional systems, leading organizations will need an individual who can master the art of applying the technology to accelerate performance while maintaining harmony in the enterprise.