• Latest
  • Trending
How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

July 14, 2022
Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 27 April, 2026
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

by ITECHNEWS
July 14, 2022
in Leading Stories, Opinion
0 0
0
How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros

How is Ransomware Ransacking Enterprise Revenues?

At the beginning of each year, we are ushered into the concept of what the new “new” is: Fifty is the new 40, red is the new blue and so on. Ransomware is a malware which has been rapidly gaining attention. It is typically introduced into a corporate network through an employee. From there it spreads quickly and executes a crypto virology attack, affecting systems adversely. Subsequently, hackers demand a ransom to restore the data, and the malware has inflicted unprecedented damage and the threat of it intensifying looms large over the cyber world.

Colonial Pipeline had to pay a $4.4 million ransom to get its oil operations back up and running after a group of hackers shut it down in 2021. The highest-ever ransom demand came from REvil at the beginning of July of last year: $70 million. Despite the fact that government and homeland security organisations advise businesses against trying to pay ransoms, the Veeam 2022 Ransomware Trends Report found that 76% of firms admit to paying ransomware attackers, with a third being unable to recover their data.

YOU MAY ALSO LIKE

French Telco Orange Hit by Cyber-Attack

ATC Ghana supports Girls-In-ICT Program

The highest average ransom payments were in manufacturing at $2.04 million, as well as energy and utilities at $2.03 million. The lowest average ransom payments were in healthcare at $197,000 and state/local governments at $214,000.

not to pay ransom

Industry experts feel that this is only the beginning for ransomware

Most organizations are moving towards a distributed enterprise system which requires connecting several enterprises to corporate networks. The arrival of the Internet of Things is also expected to make the corporate networks extremely vulnerable to ransomware attacks.

The question which arises now, is how do we deal with such a problem? How can an organization secure sensitive information?

Every business should have a thorough understanding of its data and various access points. If this information is gathered diligently, it would lay a rational basis for better information management. Governance policies also play a key role in reducing the impact of ransomware attacks.

Let us now look at some of the ways of dealing with ransomware threat:

TIP 1: Have a Thorough Understanding of Data as well as its Organization

An enterprise needs to be thoroughly prepared and informed about a probable ransomware attack. Five groups—Conti, LockBit, Pysa, REvil, and Maze/Egregor—were responsible for more than half of all ransomware attacks over the past two years, it is predicted that advanced variants of these groups will surface with newer stealth functionalities.

For example, newer versions may begin encrypting information silently. These encrypted files could be backed up, but hackers would be capable of stealing both files on the systems and in the backup.

Sounds pretty scary, yes?

Hence, it is important for businesses to preemptively prepare for an attack by categorizing and assigning information by the relative value, sensitivity, and risk. This categorization of data would lead to proper record management and information governance, thereby ensuring greater security. Such an organization of data would help the firm recover ransomware-affected files without paying a ransom.

ransomware

 

TIP 2: Have a Stable Backup Strategy in Place

Traditional backup practices may not provide an organization with ample security. An effective enterprise security strategy should entail quick backup and recovery solutions. Storing recently revised files and isolating the backup should be a critical component of the backup strategy. This ensures that the malware cannot access backup data.

A while ago, Hollywood Presbyterian hospital in California had to pay its attackers $17,000 in bitcoins. They fell prey to the ransomware attack primarily because they were not sure whether infected systems containing sensitive data or not. Had they followed cogent record-keeping methods, they wouldn’t have had to be in the position of putting their information in jeopardy.

TIP 3: Adopt Multi-layered Defense and Anti-Ransom Tools

The nature of Malware is dynamic, and hackers are always finding new ways to intrude into a corporate network. Thus, it is imperative to have a paid anti-virus software with an automatic update feature and a real-time scanner.

Enterprises should introduce training to its employees to help them understand ransomware, and how they can work towards securing their company’s environment. Backing up data is a safe move, but not a winning solution. As a part of the multi-layered defense, it is essential to secure from endpoints to networks and servers.

Ransomware attacks are typically caused by employees opening spam emails. Companies must focus their efforts to recognize and block ransomware-related emails.

All suspicious attachments should be pruned promptly and not allowed to reach enterprise servers – no matter where they are – whether virtual, physical or on the cloud. A colossal scale of ransomware can be blocked at web and email-levels.

With upcoming new variants and the triumph of the “ransomware-as-a-service” business model, it is predicted that the rise of ransomware will continue. Hence, it is important to build a strategy to reinforce cybersecurity and protect your enterprise from ransomware attacks. Ransomware has proven to be an extremely effective tool for cybercriminals. The loss of access to their data has motivated many organizations to pay large ransoms to retrieve it.

Source: WeSecureApp
Via: Security Boulevard
Tags: How Not To Pay A Ransom: 3 Tips For Enterprise Security Pros
ShareTweet

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa

July 29, 2025
French Telco Orange Hit by Cyber-Attack

French Telco Orange Hit by Cyber-Attack

July 29, 2025

Recent News

  • Absa and Visa Extend Strategic Partnership to Advance Growth and Innovation Across Africa July 29, 2025
  • French Telco Orange Hit by Cyber-Attack July 29, 2025
  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© Copyright 2026, All Rights Reserved | iTechNewsOnline.Com - Powered by BackUPDataSystems

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version