Have you dealt with ransomware or know someone who has? Is it something you take seriously?I didn\u2019t.My exposure to ransomware was limited to reading about a friend helping a friend on Facebook. Aware of the threat, I never looked deeper to learn more about it. That is until Damballa (disclosure: Damballa is a recent client) released the State of Infections report for Q2 2014 (get the full report here\u00a0).The report, also available in a concise infographic (here), is loaded with specifics and metrics on recent ransomware. The broader report held two key findings: \u00a0Ransomware is on the riseInfections continue to impact organizations of all sizesIs ransomware the equivalent of a cyber stickup?The Damballa report likens ransomware to a cyber stickup. The key difference from other malware is the total absence of stealth. Like a stickup, the purpose of ransomware is to surprise you, create fear, and take your money.Unlike traditional malware, which relies on remaining stealthy while stealing data, ransomware is nothing short of a cyber stick-up. The malware takes your computer hostage, locks files, splashes fake legal warnings on the screen and tries to shock or shame you out of hundreds of dollars in ransom.The comparison makes sense because it is a quick attack with a high payoff -- as much as $1000 per victim. Even better (or worse), ransomware is removed from the need to physically threaten someone for their money, greatly reducing overall risk to the attacker.Here\u2019s the rub: even if you pay, you don\u2019t necessarily recover from the attack. After all, what incentive does the attacker truly have to make you whole?Ransomware on the riseWith quick payoffs, often in untraceable electronic currency, ransomware is on the rise. In fact, the FBI estimates that Cryptolocker alone took in $30 million in ransom just between September and December 2013.As the Damballa report details, even the recent takedowns aren\u2019t a cause to celebrate. As criminals learn from these early efforts, we can expect more.This is to be expected. Threat actors are cunning human adversaries who can adapt. History tells us they will continue to upgrade, update and improve their malware. That doesn\u2019t mean we should give. When the opportunity exists to go after the bad guys, we must seize it.This is more of a rallying cry to change our approach and shift our tactics than it is a sign of submission.While a single campaign won\u2019t permanently change criminal or end-user behavior, one thing is certain \u2013 managing mass cyber \u00a0infections will become the norm in our interconnected world. Everyone has a stake in keeping the Internet safe, whether you\u2019re an individual user or a large enterprise with hundreds of thousands of users.What do we do about ransomware?The Damballa report details a few key areas for improvement. Based on those suggestions, here are three considerations:Faster detection: we need better ways to rapidly detect ransomware (and other threats) with high fidelity to guide our actions.Improved cooperation & coordination: between organizations, sectors, and across the global nature of this crime. Ultimately it requires improved communication and transparency.Better response at the local level: to notify victims with responses designed to remove the malware while protecting their information.The opportunity is to work together to advance each of these and share information in a way that reduces the effectiveness of ransomware.Another finding: size doesn\u2019t matterBroader than ransomware, Damballa noted the rate of infection is not tied to the size of the organization. Nor is it static:Infection rates vary greatly from enterprise-to-enterprise and from day-to-day. During Q2 2014, Damballa saw enterprises with 200,000+ devices experience only a handful of infections and those with under 600 devices have alarmingly high numbers of infections - and everywhere in between.On any given day during Q2 2014, the ratio of active infected devices ranged from under .1% up to 18.5%. The following chart is an example of how the data can be extrapolated depending on the enterprise\u2019s size.This is more evidence that the cybercriminals are no longer focusing on large organizations. They are consistently targeting and attacking smaller organizations.What steps are you taking?Have you been hit by ransomware? Know anyone who has? What steps do you follow to be prepared? What would you do if you get attacked with ransomware?Share your experience in the comments below and we\u2019ll keep advancing this conversation.