Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    To Pay or Not to Pay Ransomware? How to Face the Dilemma

    Should you pay ransomware? Here are questions to ask about your business to frame the decision – and techniques to avoid ransomware in the first place.

    By
    eWEEK EDITORS
    -
    March 24, 2022
    Share
    Facebook
    Twitter
    Linkedin
      enterprise management

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Ransomware attacks lead the headlines and strike fear in the hearts of executives who face crippling operational shutdowns and public relations nightmares. Yet too many executives are prepared to pay a ransom without considering other avenues as a means of business recovery, and place too much trust in insurance coverage and the honesty of criminal cartels. Paying ransoms don’t always lead to recovery.

      The question, then, is assuming you can, should you pay the ransom? And perhaps more important, can you justify the decision to your board of directors, insurance carrier, and law enforcement?

      The answer doesn’t fit nicely in a yes or no convention. Perhaps the closest answer is, it depends. The point is that ransom payment is often the only choice – but shouldn’t be the first one.

      Cyber insurance and data back-ups have proven a partial solution. Yet the majority of insurance policies, when paid out, create major losses for the insurer. This means premiums will go up, coverage will go down, and more “good driver history” type enforcement will apply. In fact, insurance renewals are now measured in months, not days.

      And back-ups designed in the days of business continuity weren’t designed to withstand intentional espionage – which is a staple tactic of ransomware gangs. You need more than a “fix-it-after” approach.

      Also see: The Successful CISO: How to Build Stakeholder Trust

      Avoiding Ransomware Payment Demands

      When asked how you can best avoid paying a ransom, the answer is to catch the cyberattack in its early stages. Criminals employ common tactics, techniques and procedures, which provide a breadcrumb trail for security experts, and can be caught in early stages with rapid detection and response.

      The faster you identify the early stages of the attack (and there are plenty of indicators), the better chance you have of preventing your adversary from establishing a persistent connection that leads to a pervasive ransomware detonation.

      Assuming you don’t catch the criminals in the act, then rapid recovery is preferable to payment. With resilient business continuity practices and disaster recovery programs in place, you can restore systems while mitigating prolific service outages. It doesn’t mean the criminals won’t be back, but the first score goes to you. And while criminals can shutter your operations in minutes, it might take you weeks or months to get back to business as usual.

      The majority of firms that pay ransoms believed they were prepared. They didn’t see themselves as a target. They downplayed the risk or overestimated their ability to thwart the assault. Don’t let that be you.

      Before You Pay Ransomware, Do Your Homework

      The legal landscape of ransomware attacks and data breaches has changed significantly over the last couple of years. Once protected by attorney-client privilege, incident response documents, executive decisions and potentially damaging budget exclusions can lead to expensive lawsuits or insurance claim denials.

      And many government agencies are pushing a “don’t pay” ethos backed by restrictions and even prosecution if you make a payment to a known terrorist of cybercriminal group. As such, you need to do your homework before you decide to pay.

      When faced with this decision, no one is going to make it for you. No one will indemnify your decision or alleviate knock-on liability – that’s only limited by the creativity of the plaintiff’s lawyers. You need to engage experts who can help you plan and respond to a major incident like a ransomware attack. Know your obligations.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      Before Paying Ransomware: Hard Questions

      I often say this: You need specific information to make informed decisions that are designed to minimize any negative impact.

      If you are faced with the untenable decision to pay a ransom, ask yourself these questions before you do:

      1. Can we recover without paying the ransom?
      2. Will paying the ransom accelerate the recovery?
      3. Is paying the ransom the only viable option?
      4. Can we pay the ransom without risk of legal penalty?
      5. Should we contact law enforcement and will that help if we violate a sanction?
      6. Will our insurer cover the ransom?
      7. Should we notify our clients, partners or employees?
      8. Are we required to notify regulators or state authorities?

      When you answer those questions, like the issue of ransom payment itself, it’s not a yes or no exercise. Remember, of course, that you have to stand by your answers and possibly defend your decisions in court.

      Also see: Best Website Scanners 

      Preventing Ransomware 

      At a cybersecurity event, I had the privilege of meeting Bruce Mathison, who was a star quarterback for the Buffalo Bills back in the 1980s. While trading a signed copy of my book for a signed copy of his rookie card, he gave me the best piece of wisdom for dealing with incidents out of your control.

      He said, “You don’t practice until you get it right. You practice until you don’t get it wrong.” Sage advice from a veteran of the gridiron.

      So how do you establish controls and programs – methods to practice – that detect and respond to a ransomware attack? Basic security controls drastically reduce the risk of a business disrupting ransomware attack, and provide quick recovery methods that don’t rely on paying extortion fees for decryption keys (these keys don’t always work, but that’s another topic).

      Here are basic controls for your two main groups:

      For Employees

      1. Require multi-factor authentication to access business systems.
      2. Protect remote connections with a Virtual Private Network (VPN) or equivalent service.
      3. Mandate user awareness training and testing that covers:
        • Job-based phishing lures, not generic examples.
        • Downloading files from untrusted sources.
        • Inspecting URLs and file extensions to ensure legitimate and intended content.
        • Prohibiting free versions of applications.
        • Compliance-based requirements.

      For Administrative

      1. Employ least privilege for employees and remove administrative rights where possible.
      2. Disable Remote Desktop Protocol (RDP) when not in use.
      3. Segment network systems.
      4. Regularly patch systems based on a prioritized list of critical systems.
      5. Back-up all critical files and systems using segmented or offline designs and regularly test fail-over and recovery services.
      6. Restrict administrative access to critical systems with Privileged Access Management (PAM) or similar systems.
      7. Deploy Endpoint Detection and Response (EDR) agents on Domain Controllers (DC), centralized Logging systems and Active Directories (AD) and other critical systems frequently targeted by criminals.

      While bad actors will likely continue utilizing new ransomware to target vulnerabilities, there are things you can do to shore up your fortress walls. And should those walls be breached, remember to tread thoughtfully in regard to next steps.

      While paying the ransom may seem like the quickest, easiest way to move forward, there’s too much at stake without asking yourself some key questions first.

      Also see: Tech Predictions for 2022: Cloud, Data, Cybersecurity, AI and More

      About the Author:

      Mark Sangster, Vice President and Industry Security Strategist, eSentire

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×