Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Ransomware: Four Ways to Assess This Growing Threat as a Business Risk

Contending with hostage situations is no longer something only shipping companies moving goods through pirate-infested waters must consider. With the growing threat of ransomware – malware that locks data until an enterprise pays for its decryption – businesses across industries have found themselves negotiating with criminals to release critical corporate information. 

Contending with hostage situations is no longer something only shipping companies moving goods through pirate-infested waters must consider. With the growing threat of ransomware – malware that locks data until an enterprise pays for its decryption – businesses across industries have found themselves negotiating with criminals to release critical corporate information. 

One such victim of ransomware was Hollywood Presbyterian Medical Center, a Los Angeles hospital, who recently paid $17,000 to unlock systems taken hostage by criminals. During the attack, the hospital staff reverted to paper records and diverted many high-risk patients to local hospitals. With so much of an organization’s operations dependent on their computer and internet access, it can be catastrophic if they no longer are able to reach these systems.

When data or software is inaccessible, it can slow business operations, cost a company money and damage an enterprise’s reputation. Because of this, it’s critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue. 

When an incident occurs, time is critical. The longer an organization waits to respond, the longer its business functions and reputation could suffer. So it’s important that businesses create a response plan for a ransomware incident before an attack occurs, including criteria for determining whether or not to pay to unlock data. Ultimately, the choice to pay or not is a business decision that requires considerations from across the organization and must be debated and agreed upon ahead of time. 

While the calculus of each business will be different, there are several steps companies should take now, before a threat occurs. Considering these factors before an attack will not only aid in response but also show customers, stakeholders and the public that the enterprise has a well-reasoned strategy for dealing with ransomware incidents. 

When creating a plan and considering whether to pay ransoms, enterprises should consider the following items:

1. Back-up and Imaging of Data – With the exponential growth of corporate data, it’s difficult for enterprises to know what information they have and where it’s stored. However, this knowledge is critical to determine whether to pay a ransom. If a company has a solid backup of the data taken hostage, it may be able to revert to spinning up a new copy with backup restoration without needing to pay the criminals.  

2. Importance of the Data – Organizations should take inventory of their data and systems, identifying the operational-critical pieces and then deciding how much they can spend to release the data given an attack. Determining specific criteria beforehand will make responding to a ransom request easier should an attack occur.

Advertisement. Scroll to continue reading.

3. Reputational Damage – It’s never good when criminals take an organization’s data hostage, but it can be particularly bad for an organization devoted to protecting and serving communities, like law enforcement departments and hospitals. In addition to the importance of compromised data, enterprises should consider how their response to a ransomware attack will affect their reputation with customers, partners and shareholders. 

4. Consider the Liability – While paying a ransom may be the easiest way to release compromised data, there’s never a guarantee that criminals will release the information – you are dealing with professional thieves, after all. But according to the FBI, most organizations that pay the ransom do get their data back. Another argument may say that paying ransoms only encourages criminals and enables them to refine their attacks. However, it’s equally possible that your organization may become a less attractive target, because the company will be more aware and harden the systems against attacks. 

Once a ransom is paid and an enterprise’s data unlocked, regular business functions can resume. But it’s important for the company to address potential fallout from an attack and the company’s reaction. Enterprises should consider how best to communicate their decision to customers and their industry, engage stakeholders and strengthen security to prevent another attack. 

It’s important for organizations to think through these hypotheticals before an incident rather than during an attack. Having a clear response plan to help determine whether to pay to unlock compromised data will help organizations deal with an attack rationally and come to the best possible decision. 

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...