Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Just Paid the Ransom? Here’s How to Prevent It From Happening Again

By Richard Langston
cyberinsurance
December 23, 2019

Hackers can be relentless with their cyberattacks. While organizations can be vulnerable to many security threats, ransomware is especially ruthless since its attacks are completely automated. It doesn’t matter what industry or business you are in – hackers don’t care if your organization has “nothing of value,” their machines will try to attack anything that is vulnerable.

Ransomware is on the rise globally because it’s been proven to be an effective (and profitable) strategy for hackers. In the last year alone in the U.S., hackers’ ransomware attacks impacted county hospitals, local businesses and over 40 municipalities with attacks, often forcing these organizations to make the difficult choice between paying the ransom or losing their data.

While security professionals don’t want to reward these cybercriminals by giving in and paying the ransom, when business-critical data is at risk, the stakes are high and some organizations make the decision to pay up. Because many do pay the ransom to regain access to their sensitive data, hackers are incentivized to continue executing these attacks.

The challenge is that many security teams lack the staff and resources they need to confidently provide security for their organizations, leaving them no choice but to pay the ransom. That said, there are measures organizations can take to help reduce their attack surface and lessen the chances of falling victim to a(nother) ransomware attack. 

These five best practices will help organizations fend off hackers and minimize risk:

  1. Conduct End-User Security Training: The best first step an organization can take is to educate its users on how to spot phishing and spear-phishing techniques. The IT and security team should educate staff on how to vet phishing emails, as these attacks can expose an organization to malicious web content or end-user actions that can infect devices.
  2. Setup and Test Reliable Backup and Recovery Procedures: In case of a ransomware attack, having a reliable backup of data will allow organizations to refuse to pay the ransom. Be sure to test recovery procedures before it’s too late. During testing, organizations will be able to investigate and refine problem areas, bracing for if or when an emergency occurs.
  3. Establish Good Hygiene Practices for Your Endpoints: Ransomware attacks often target endpoints because that’s where data lives and that’s what the user uses, thus the best fix for ransomware attacks is to improve your endpoint security hygiene. Patching, system/application updates, end of support/life platform migrations, user administration and configuration management can be tedious, but these actions will greatly reduce the risk of opportunistic attacks and help mitigate risk. Also, disable or remove any and all software that’s not necessary or critical to your organization.  
  4. Implement Continuous Vulnerability Assessment:  Regular and continuous vulnerability assessment scanning will identify application, OS and network vulnerabilities, so organizations can prioritize remediation efforts that can help prevent ransomware attacks.
  5. Block and Filter Inbound and Outbound Connections: If organizations block and filter inbound and outbound connections at the gateway, the ransomware is disrupted before it can affect the organization. Pro tip: set up a reputation feed that will help block known threats, alerting when connections are initiated so the organization can investigate and correlate connections with known bad actors.

The best defense against ransomware and other threats is a mature security program. If you have any questions about what additional protections could be needed, the NIST security framework provides great process guidance for assessing your gaps and priorities.

The only way to recover from a ransomware attack is for an organization to have complete backups of its systems, wipe them clean and start over. In any case, having backups is arguably the best defense in the event that hackers will still steal an organization’s data even after paying the ransom. Organizations should see to it that backups aren’t stored on its own network where it can be encrypted with the rest of the ransomed data.

Keep note that the speed of recovery is also critical, as business costs increase when businesses cannot fully operate, leading to system downtime and loss of productivity. If an organization is recovering from an attack, it should implement the above controls and invest in endpoint security, email and web gateways and intrusion detection systems, as those tools are helpful in identifying most ransomware attacks.

These tips are simple, but could save an organization’s data, money and, in some cases, its entire business. Attacks can happen at any time, so taking the necessary protocols now will help organizations ultimately be more resilient.

KEYWORDS: cyber security cybersecurity endpoint security ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Richard Langston is Senior Technical Product Marketing Manager at AT&T Cybersecurity.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Think You Know How to Investigate a Theft or Fraud? Think Again. Here’s the Right Way to Do It

    See More
  • cyber security freepik

    The fight against cyber threats requires a public-private partnership. Here’s how to get it done.

    See More
  • Are Security Officers Difficult to Motivate? Yes, and Here’s How to Overcome It

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing