WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness – Poor Configurations to Blame for Large Percentage of Ransomware
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness – Poor Configurations to Blame for Large Percentage of Ransomware

Author: Alec Davison

Created: Tuesday, August 23, 2022 - 18:45

Categories: Cybersecurity

A new report from Microsoft analyzes the evolving nature of the ransomware business into a ransomware as a service (RaaS) model and offers important lessons and recommendations for network defenders. The most notable finding, among others, is that over 80 percent of ransomware attacks can be traced to common configuration errors in software and devices. The RaaS model lowers the barrier to entry and obfuscates the identity of the attackers behind the ransomware. Microsoft also found that in almost every observed ransomware incident, “at least one system exploited in the attack had missing or misconfigured security products that allowed intruders to tamper with or disable certain protections.” Misconfigured applications, typically in “legacy” default state, are exploited by attackers which can provide them with access across entire organizations. According to Microsoft, the median time for an attacker to begin moving laterally inside a network after device compromise is one hour, 42 minutes, while the median time for an attacker to access private data following a phishing attack is one hour, 12 minutes. To defend against ransomware attacks, members are encouraged to make sure all systems are up to date, conduct regular patch management, enhance credential hygiene, and regularly reference CISA’s StopRansomware page for more guidance and resources. Read more at Info-Security or access the full report at Microsoft.

Related Resources

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Claude Mythos Preview: The AI Inflection Point in Vulnerability Management

Apr 16, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar