Why do half pay ransom in incidents!?

Ransomware attacks remain a major problem for organizations worldwide. Despite companies' increasing preparation for such attacks, recent reports from Fortinet and ChannelConnect show that about half of all organizations will be victims of a ransomware attack by 2023. In addition, it is troubling that many companies, even if they are confident in their preparation, still pay ransoms to cybercriminals. This article examines the findings of these reports and explores why organizations often pay ransoms despite their confidence in their security measures.

Alarming figures around ransomware attacks

A recent study by Fortinet, a leading cybersecurity company, shows that 50% of all organizations will fall victim to ransomware attacks by 2023. This means that despite increased awareness and investment in security solutions, cybercriminals are still successful in holding corporate data hostage.

Self-confidence in preparation, yet pay ransom

According to the researchers, 78% of organizations believe they are well prepared for ransomware attacks. Nevertheless, the results show that nearly half of affected companies (47%) choose to pay the requested ransom. This suggests a discrepancy between self-confidence in preparing for ransomware attacks and the actual effectiveness of the measures taken.

Reasons to pay ransom

Although paying ransom to cyber criminals is generally discouraged, there are several reasons why companies decide to do so anyway. Some factors that may come into play include:

  • Time pressure

In many cases, cybercriminals pressure their victims by setting a deadline for paying the ransom. Companies that cannot restore their systems quickly enough may feel compelled to pay to prevent further damage.

  • Cost of downtime

Not being able to use mission-critical systems can result in significant financial losses. In some cases, paying a ransom may be cheaper than absorbing the cost of prolonged downtime.

  • Insufficient backups

If companies do not have up-to-date backups of their data, they may be at risk of losing important business information. In such situations, paying a ransom may be the only way to access this vital data.

  • Lack of expertise

Not all organizations have the necessary expertise to recover their systems after a ransomware attack. In these cases, paying a ransom may be seen as a necessary measure to restore their data and systems.

Consequences of paying ransom

While there are understandable reasons why companies choose to pay ransom, there are also important consequences to this decision:

  • Encouraging cybercrime

Paying ransoms encourages cybercriminals to continue with their activities because it proves to be a lucrative venture. This can lead to an increase in ransomware attacks on other organizations.

  • No guarantee of recovery

There is no guarantee that paying the ransom will actually restore the hostage data and systems. Cybercriminals may choose to accept the ransom without providing the promised decryption key or may still destroy the data.

  • Reputation damage

Organizations that pay ransom can face reputational damage. Customers, partners and other stakeholders may lose confidence in the company, which can ultimately lead to loss of customers and revenue.

Recommendations to effectively combat ransomware attacks

To effectively combat ransomware attacks and prevent ransom payments, organizations can take the following measures:

  • Investing in cybersecurity

Organizations must invest sufficiently in advanced security solutions and services to protect their systems and data from ransomware attacks.

  • Regular backups

Making regular and reliable backups of business-critical data can significantly reduce the impact of a ransomware attack. In the event of an attack, companies can restore their systems without having to pay for decryption.

  • Training and awareness

Employees play a crucial role in the security of an organization. It is important to train them in recognizing suspicious emails and other potential attack vectors, and teaching them how to respond to such situations.

  • Incident Response Plan

Organizations should create a well-thought-out incident response plan and test it regularly. This ensures that they can respond quickly and effectively to a ransomware attack, minimizing the impact on business operations.

  • Collaboration with external experts

Companies can consider partnering with outside cybersecurity experts, such as specialized incident response companies, to ensure they have the latest knowledge and skills to effectively combat ransomware attacks.

  • Continuous monitoring and updating

Organizations must constantly monitor and update their security measures to stay abreast of the latest threats and vulnerabilities. This includes regularly patching software and updating security solutions.

Conclusion

Ransomware attacks pose an ongoing threat to organizations worldwide. Although many companies are confident in their preparation for such attacks, recent surveys show that a significant number of organizations still pay ransoms to cyber criminals. This suggests a gap between the perception of the effectiveness of security measures and the actual situation.

To effectively combat ransomware attacks, it is crucial that organizations invest in advanced security solutions, perform regular backups, train employees in cybersecurity awareness, create an incident response plan and collaborate with outside experts. By taking these measures, companies can minimize the impact of ransomware attacks and avoid the need to pay ransom.

In a world where cybercrime is becoming increasingly sophisticated and aggressive, it is important that organizations take a proactive approach to protecting their systems and data. Only by constantly investing in cybersecurity and adapting their strategies can companies effectively manage the risks associated with ransomware attacks.

Would you like to download and read the entire report? You can find it here Report 2023 Ransomware Global Research

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?