Taking the Ransom Out of Ransomware

Legislation has made the choice simple . . .

An Article Review

As the UK moves to prohibit government agencies from paying ransoms to hacker groups, organizations are questioning whether they can endure an attack.

For a long time the question of what to do when facing a ransomware attack has included the question of whether or not to pay the ransom, and we’ve always advised that this is a question for your cybersecurity insurance provider (and potentially law enforcement). 

 

Title of Article: Taking the Ransom Out of Ransomware: An Article Review with a picture of a computer with a chain and lock around it and th infotex logo

However, the Government of the UK is joining a growing number of groups that believe a ban on ransom payments is the best way to combat those criminals… and in a scenario where you’re not allowed to make a payment, what is an organization to do?

While most of us still have the option to pay a ransomware group (depending on our cyber insurance policy), we tend to agree with the idea that the best course of action is to never need to make that payment to begin with. To that end, an organization needs to focus on resilience: avoiding an attack to begin with and failing that, having ways to recover lost data and offline systems.

Technology such as endpoint detection and response can be of great benefit, but the biggest factor in breaches remains the human factor: employee awareness can go a long way toward keeping your systems secure. Additionally, having a robust incident response program and disaster recovery testing—including data backups—will help make sure you’re able to recover from an incident without needing to pay a criminal organization.

We don’t know of any plans by US legislators to prohibit payments to ransomware organizations, but with the right planning, training and testing whether or not to pay can be a question you never need to ask.

Original article by JP Cavanna writing for Cybersecurity Insiders

This Article Review was written by Vigilize.


Matt Jolley is the current Vigilize, he is also the recipient of the 2023 & 2024 Cyb3rP0e+ designation!

To see more content like this in your inbox, sign up for our newsletter here!

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

The Magnificent Seven 2023

Seven Trends . . . …that small bank Information Security Officers face in 2023 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome t...

“Patch Endpoints Holiday Sweater” – Awareness Poster

Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers!Check out posters.infotex.com for th...