Ransomware attacks: 'when' not 'if'

Are you properly prepared for the worst?

You may think your organisation is well prepared for a ransomware attack, but having some point solutions in place is not always the complete answer. Being properly prepared for the worst involves a more comprehensive strategy, and this series of articles from The MYREDFORT team aim to help.

The first article focuses on understanding more about recent attacks, how hackers are innovating, and laying the foundations for preparedness. As attacks become increasingly innovative, traditional defences are being left wanting. Recent attacks such as REviL have seen hackers manually controlling the operation instead of relying on viruses working on their own accord.

How are attackers breaking through the barriers?

Even organisations with credible cyber security solutions in place have been successfully targeted by sophisticated hackers. Remote desktop protocols (RDP) with configuration loopholes are a particular weakness, as are poor disciplines in identity and access management (IAM). Data and passwords stored on the dark web are also being used by criminals to gain access to devices or core infrastructure.

How is an attack coordinated?

As in any battle, conflict or even competitive sport, knowing your enemy is another vital step in winning the fight against ransomware attackers. Having gained access to a corporate network, hackers then seek out the valuable data and attempt to prevent access to endpoints, cloud applications and backups. The data is then wiped, encrypted and used for extortion purposes and even to publish data if the ransom payment is not made.

Worse still, it can take up to five days for an organisation to even realise the attack is in progress. From the first penetration of the system, hackers can embed the ransomware silently and have it take hold before IT teams are even aware of a problem. By using this approach, hackers can maximise the chances of success, and the chances of at least some of the ransom being paid.

Upping the ante with preparations

Sadly, the sophistication of ransom attacks now means it’s more a case of 'when' not 'if' that UK organisations will experience some kind of attack. Preparation for incidents should be well thought out, and solid plans implemented to prevent and detect attacks. Should the worst happen, it’s important to have contingency strategies in place to respond and recover your systems and/or data in the shortest time possible.

The key question will ultimately be will the ransom be paid? This will be an executive level business decision with input from security and legal experts. The balance will be based on the impact, severity and implications of doing so or not doing so, but the reality is that almost 50% of companies have paid out the ransom.

Find out more

👀 In the next in our series of articles (watch this space!), we’ll look at backup and recovery in the context of ransomware attacks.

Related Articles
Cyber Security Wearing multiple hats?
Wearing multiple hats?

Here's 6 ways to become a cyber guardian!

Cyber Security The art of networking
The art of networking

Top 10 tips to get the most from networking events

Modern Workplace CyberSync 2024 | 4-5 June
CyberSync 2024 | 4-5 June

The MYREDFORT Community's own in-person networking and hospitality events to coincide with InfoSecurity Europe.

Cyber Security Global Threat Intelligence Report: March 2024 Edition
Global Threat Intelligence Report: March 2024 Edition

Actionable and contextualised intelligence from Blackberry to increase your cyber resilience.

Cyber Security SMB cybersecurity tips
SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security LogRhythm's cybersecurity summit
LogRhythm's cybersecurity summit

A cutting-edge exploration of security trends and tools.

Cyber Security Fortify your tech stack
Fortify your tech stack

Game-changing cybersecurity defence strategies.

Cyber Security 5 reasons to join SWCRC
5 reasons to join SWCRC

Get your FREE police-backed cyber security advice for SMBs.

Cyber Security February's three top tips to secure your business
February's three top tips to secure your business

This month's expert guidance from the police-backed South West Cyber Resilience Centre.

Cyber Security Threat hunting in multi-cloud environments
Threat hunting in multi-cloud environments

How to deploy a comprehensive multi-cloud threat hunting strategy.

Cyber Security 5 expert security predictions for 2024
5 expert security predictions for 2024

Barracuda executives give their inside take on the year ahead.

Cyber Security Cyber exposures - an insurers' perspective
Cyber exposures - an insurers' perspective

An expert's view on the state of cyber risk.

Cyber Security January's three top SMB cybersecurity tips
January's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Ready for the worst?
Ready for the worst?

Prepare for the worst in the event of a cyber attack: Customise your incident response plan

Cyber Security December's three top SMB cybersecurity tips
December's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Latest Threat Report
Latest Threat Report

70% increase in unique malware among other threats

Cyber Security November's three top SMB cybersecurity tips
November's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Three steps to mitigate cyber attacks
Three steps to mitigate cyber attacks

Prevention is better than cure with ransomware attacks

Cyber Security October's three top SMB cybersecurity tips
October's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security September's three top SMB cybersecurity tips
September's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Zero-day: How to close data vulnerabilities
Cyber Security ChatGPT and the security of your business
ChatGPT and the security of your business

How can cybersecurity and IT operations leaders adjust? Find out in this live webinar

Cyber Security Continuous controls, compliance and risk mitigation
Cyber Security CyberSync 2024
CyberSync 2024

Sales Channel Sundowners - after InfoSec closes on 4 & 5 June 2024

Cyber Security Powering Cybersecurity with Mastercard
Powering Cybersecurity with Mastercard

Mastercard cybersecurity solutions protect the people, transactions and devices that power businesses

Cyber Security Risk and reward in Power Platform
Risk and reward in Power Platform

The top three security risks that could be lurking in Power Platform.

Cyber Security The "other" purpose of a cyber security strategy
The "other" purpose of a cyber security strategy

Best practices: Improve your business cyber defenses for cyber insurability

Cyber Security A cross-NIST approach to cyber security
A cross-NIST approach to cyber security

Expert ransomware market insights for 2023

Cloud Security Microsoft Secure Live
Microsoft Secure Live

Explore the most comprehensive, industry-leading solutions to help you protect everything.

Cyber Security Improve your security posture - in 1 minute
Improve your security posture - in 1 minute

How a web application firewall helps.

Modern Workplace Using data to justify M365 investment
Using data to justify M365 investment

Join a live webinar on 23 February to see how to use data to prove value and bolster performance.

Cyber Security Understand the current cyberthreat landscape
Understand the current cyberthreat landscape

Security tips you can put into action today.

Cyber Security The outlook for cybersecurity and privacy in 2023
The outlook for cybersecurity and privacy in 2023

Six key trends to look out for - and adapt.

Cyber Security Cyber attacks becoming "uninsurable"
Cyber attacks becoming "uninsurable"

Zurich CEO issues warning.

Cyber Security Why cybercriminals love your SME
Why cybercriminals love your SME

With 2/5 of UK SMEs being hit, what's the attraction?

Cyber Security Are your cyber defences built on sand?
Are your cyber defences built on sand?

How Acronis helps manage a constantly evolving threat landscape.

Cyber Security While football might be coming home, keep cyber attacks away!
While football might be coming home, keep cyber attacks away!

Keeping users safe from heightened threats.

Cyber Security Your Google Workspace and Microsoft 365 data is at risk
Your Google Workspace and Microsoft 365 data is at risk

Protect it against ransomware and other threats.

Cyber Security Why are small business or charities hit?
Why are small business or charities hit?

Smaller companies can be softer targets

Cyber Security FREE cyber insurance for your business
FREE cyber insurance for your business

£25,000 cover with Cyber Essentials

Cyber Security 14 questions to assess software risk
14 questions to assess software risk

Implementing a framework-based mindset

Cyber Security 5 fundamentals of cyber security
5 fundamentals of cyber security

Identify your risks and vulnerabilities

Cyber Security Building cyber resilience in 2024
Building cyber resilience in 2024

Essential viewing to protect yourself from cyber crime this year

Cyber Security SWCRC Cyber Resilience Community
SWCRC Cyber Resilience Community

Supported by the Home Office, Policing and Ambassador partners

Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch