Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

6 common mistakes that lead to ransomware infections

By Jeff Stout
ransomware-attack freepik
October 27, 2021

Ransomware is out of control, with some of the most significant ransomware attacks netting ransoms as high as $40 million. Beyond the immediate financial loss, ransomware infections can cause substantial reputational damage for many companies, and in the case of leaks of sensitive data, legal expenses. 

The need for robust cybersecurity is more evident than ever — but is cybersecurity alone enough? There are several problems in how many of us think about cybersecurity that puts us at risk. This is very apparent when you look at the cause of most ransomware infections today — some are caused by classic mistakes which can easily be fixed, but truly effective security requires changing the way we think about cybersecurity in fundamental ways. 

So with no further ado, let’s take a look at six of the most common mistakes that lead to ransomware infections. 


1. Outdated and unpatched operating systems.

As cybersecurity threats intensify, the patches and updates to deal with vulnerabilities multiply along with them. Hackers scan the internet looking primarily for people who are running outdated software, so running an outdated operating system is kind of like waving a red flag and yelling, “Attack me!” 

This doesn’t just include desktop operating systems but also server operating systems. Older Windows servers, in particular, are frequently targeted for ransomware attacks.


2. Lack of knowledge about social engineering.

Unfortunately, many of us think about cybersecurity as the domain of the “tech guys” or their cybersecurity team, but this is not the case. Strong cybersecurity is essential, but a large number of hacks today use social engineering methods like phishing. This is the most common attack vector used in ransomware attacks. 

The reality is that a basic understanding of cybersecurity is becoming as essential to modern life as typing skills. Knowing how social engineering attacks occur and how to spot them is critical for everyone who uses a network. When it comes to organizations with large networks, the chain is only as strong as the weakest link. 

For this reason, many organizations have started conducting phishing awareness training, where some common phishing techniques are explained, and employees are instructed on how to avoid them. It’s also essential to keep updated with new types of attacks used by hackers and regularly refresh employee training. 


3. Lack of technical knowledge among business leaders.

The misconception that the IT guys can handle all aspects of cybersecurity is very dangerous. Cybersecurity literacy is especially important for senior management and decision-makers who are usually very busy handling other aspects of operations.

The problem is that many decisions that affect the structure of a company also have significant ramifications for cybersecurity. Business leaders must take charge of issues like anti-phishing training, the need to keep all systems and hardware up-to-date, and the legal and operational risks of different types of network architecture. 

 

4. Remote Desktop Protocols with improper configuration.

After phishing, remote desktop protocols are probably the second most common cause of ransomware infections. The situation has gotten worse during the COVID-19 pandemic, as RDP use has gotten more frequent. 

Believe it or not, the most common reason for RDP vulnerabilities is weak passwords. It’s easy for an attacker to scan for open RDP ports and then attempt brute force attacks. This can be prevented simply by using a strong password or configuring the RDP, preventing additional login attempts after a few incorrect attempts. 


5. Keeping older hardware and firmware when updates are needed.

If it ain’t broke, don’t fix it. So the saying goes, but the trouble is that your hardware may be broken without you realizing it. 

Some organizations see no need to upgrade older equipment that is working fine for their current operational requirements. However, in many cases, software producers will stop maintaining older software at some point. This means that if new vulnerabilities are discovered, they will not necessarily release patches. 

This applies not only to hardware but also firmware. It’s essential to verify that all hardware and firmware is currently maintained and regularly updated to reflect patches, which may mean upgrading equipment. If you don’t and end up running outdated software, your network will look like low-hanging fruit for hackers.

6. Relying on antivirus software.

Ransomware gangs are growing increasingly sophisticated when it comes to evading antivirus software. Too many companies feel that their antivirus software protects them, but that’s true only to a limited extent. 

While antivirus software may prevent some common viruses, it will probably not detect a highly targeted ransomware attack. Additional measures like network activity monitoring are required to detect unusual activity. Some AI-powered, next-generation antivirus software may be able to do this, but it’s usually not cheap. 

A good ransomware defense requires a comprehensive suite of security features designed not only to prevent attacks but also to minimize damage when they do occur. 

Just avoiding these six simple mistakes can dramatically reduce your risk of a ransomware attack. Hackers are thieves; generally, they’re usually looking for easy money and don’t want to work hard for it, so if you make things difficult for them, in most cases, they’ll go looking for some other victim. 

KEYWORDS: cyber security ransomware risk management social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff stout

Jeff Stout is a cybersecurity consultant with Beforecrypt. His work brings him into contact with both victims and hackers involved in ongoing ransomware cases on a daily basis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • physicalsec_enews

    6 Common Building Security Mistakes That You Must Avoid

    See More
  • desk with laptop, coffee and notepad

    Three common mistakes that introduce risk

    See More
  • How to Hire a Leader: Six Common Screening Mistakes

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing