Cybercriminals are often experts. An extortion attempt usually begins with an individual or a group selecting a target in one of two ways: either they receive a request from an extortionist or they find their own prey to sell access.
Attackers pick victims who have a good chance of paying and unfortunately they buy products to keep the bad guys out.
Help in this video for Net Security, Dennis Underwood, CEO Cyber CrucibleDiscusses why we are taking the wrong approach to data snatching and how to get the right one.