Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Just Paid the Ransom? Here’s How to Prevent It From Happening Again

By Richard Langston
cyberinsurance
December 23, 2019

Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.

Ransomware is on the rise globally because it’s been proven to be an effective (and profitable) strategy for hackers. In the last year alone in the U.S., hackers’ ransomware attacks impacted county hospitals, local businesses and over 40 municipalities with attacks, often forcing these organizations to make the difficult choice between paying the ransom or losing their data.

While security professionals don’t want to reward these cybercriminals by giving in and paying the ransom, when business-critical data is at risk, the stakes are high and some organizations make the decision to pay up. Because many do pay the ransom to regain access to their sensitive data, hackers are incentivized to continue executing these attacks.

The challenge is that many security teams lack the staff and resources they need to confidently provide security for their organizations, leaving them no choice but to pay the ransom. That said, there are measures organizations can take to help reduce their attack surface and lessen the chances of falling victim to a(nother) ransomware attack. 

These five best practices will help organizations fend off hackers and minimize risk:

  1. Conduct End-User Security Training: The best first step an organization can take is to educate its users on how to spot phishing and spear-phishing techniques. The IT and security team should educate staff on how to vet phishing emails, as these attacks can expose an organization to malicious web content or end-user actions that can infect devices.
  2. Setup and Test Reliable Backup and Recovery Procedures: In case of a ransomware attack, having a reliable backup of data will allow organizations to refuse to pay the ransom. Be sure to test recovery procedures before it’s too late. During testing, organizations will be able to investigate and refine problem areas, bracing for if or when an emergency occurs.
  3. Establish Good Hygiene Practices for Your Endpoints: Ransomware attacks often target endpoints because that’s where data lives and that’s what the user uses, thus the best fix for ransomware attacks is to improve your endpoint security hygiene. Patching, system/application updates, end of support/life platform migrations, user administration and configuration management can be tedious, but these actions will greatly reduce the risk of opportunistic attacks and help mitigate risk. Also, disable or remove any and all software that’s not necessary or critical to your organization.  
  4. Implement Continuous Vulnerability Assessment:  Regular and continuous vulnerability assessment scanning will identify application, OS and network vulnerabilities, so organizations can prioritize remediation efforts that can help prevent ransomware attacks.
  5. Block and Filter Inbound and Outbound Connections: If organizations block and filter inbound and outbound connections at the gateway, the ransomware is disrupted before it can affect the organization. Pro tip: set up a reputation feed that will help block known threats, alerting when connections are initiated so the organization can investigate and correlate connections with known bad actors.

The best defense against ransomware and other threats is a mature security program. If you have any questions about what additional protections could be needed, the NIST security framework provides great process guidance for assessing your gaps and priorities.

The only way to recover from a ransomware attack is for an organization to have complete backups of its systems, wipe them clean and start over. In any case, having backups is arguably the best defense in the event that hackers will still steal an organization’s data even after paying the ransom. Organizations should see to it that backups aren’t stored on its own network where it can be encrypted with the rest of the ransomed data.

Keep note that the speed of recovery is also critical, as business costs increase when businesses cannot fully operate, leading to system downtime and loss of productivity. If an organization is recovering from an attack, it should implement the above controls and invest in endpoint security, email and web gateways and intrusion detection systems, as those tools are helpful in identifying most ransomware attacks.

These tips are simple, but could save an organization’s data, money and, in some cases, its entire business. Attacks can happen at any time, so taking the necessary protocols now will help organizations ultimately be more resilient.

KEYWORDS: cyber security cybersecurity endpoint security ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Richard Langston is Senior Technical Product Marketing Manager at AT&T Cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Think You Know How to Investigate a Theft or Fraud? Think Again. Here’s the Right Way to Do It

    See More
  • cyber security freepik

    The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

    See More
  • Are Security Officers Difficult to Motivate? Yes, and Here’s How to Overcome It

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing