Key findings from the report include:

1. Prominence of double extortion

backups may help victims recover encrypted information, but won’t prevent an attacker from leaking their stolen data online.

2. Prevalence of cyber insurance payouts

Businesses have resorted to cyber insurance as a failsafe against financial losses but fail to realize that the insurance is often insufficient, with many loopholes for coverage. Cyber insurance is now a conduit for infusing monies into the illegitimate software market of ransomware.

3. Increasingly complex attack sequences

Legacy security measures have fallen short with the rise of complex attack sequences in national-state sponsored attacks.

Check out this infographic for the facts and figures.