Digital Extortion: Difference between revisions

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
No edit summary
 
(No difference)

Latest revision as of 11:03, 3 November 2020

Note: Refer to Extortion.









Click to know more about expert level training

(Source: Business Continuity Management Institute - BCM Institute)

 

A Manager’s Guide to Business Continuity Management for Cybersecurity Incident Response

2. Extortion cases are often difficult and harrowing for the victim. As investigators work furiously to validate claims made by the threat actor, the doomsday clock continues to tick. Often, victims are faced with the inevitable decision to give in, or not give in, to threat actor demands as the clock counts down. For this reason, we consider digital extortion as a lethal data breach scenario.
Source: (Verizon, 2016)