Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityCyber Case Studies

A first-hand account of ransomware: To pay or not to pay

By Tony Mendoza
A first-hand account of one CISO's response to ransomware
December 17, 2020

Digital transformation has led to the deployment of a greater number of innovations and applications that generate more and more data. While the world’s collective knowledge and advancement depends on the ongoing aggregation, analysis and distribution of vast amounts of data, the preservation of these digital assets, especially during the pandemic, is at risk from cyberattacks.

Data undergirds the operations of the vast majority of organizations, and is considered a precious commodity that delivers a competitive advantage. Protecting these valuable and irreplaceable digital assets is a key mission of every security and IT department, including ours.

Like many companies, we developed our own best-of-breed business continuity and disaster recovery plans, but never imagined they would be put to the test so dramatically as they were this year. Due to the pandemic, we pivoted in a single day from supporting a large on-premise workforce to sustaining a workforce that was almost 100% remote. This type of unanticipated phenomenon required us to further strengthen our security measures, including closing security gaps, maximizing scalability and future-proofing our systems.

In early May 2020, many of our servers and associated applications suddenly stopped functioning. It took my team mere minutes to realize that unrelated applications were starting to glitch – causing concern because we have automatic recovery. As we raced around checking servers, we saw ransom notes that demanded as much as $3.6 million USD (requested in bitcoin) or lose our corporate data.

My team and I immediately cut the cord between all of our servers and shut them down to mitigate the damage. The next several hours were spent checking the state of our systems and the extent of the damage. Our email server was not compromised and we turned it back on to notify the entire workforce of the breach and advise them about further actions as well as system disruptions. 

We placed a call to the FBI cybersecurity team and contacted our insurance company (we have ransomware insurance) who set us up with a security consulting firm. They helped us stop the bleeding and assess where we were.

Our initial assessment, revealed that 90% of the data on our servers was encrypted. In addition, the ransomware encrypted critical system files that rendered some servers completely inoperable.

To our dismay we realized we were 100% down. Any data on production disk was encrypted at the speed of disk. On the other hand, we also rely on tape for backup and disaster recovery which provided an “air gap” from the ransomware. This is also augmented by disk snapshots, many of which escaped being encrypted. We realized that we could have survived an even worse attack or physical disaster (fire, flood), due to the unique attributes of tape storage being removable and off of the network stream.  As part of our data recovery strategy, we regularly store copies of all our data on tape, and this gave us the confidence to decide that we would not pay the ransom. We had our data; now it was time to reconstruct.

Our tape copies gave us the peace of mind to advance without second guessing our decisions. In fact, we had tape backups that were 99.9% current from the week before.  A huge advantage in our recovery was that nothing was accessed through our VPN. It took us a total of four days, 24 hours a day, to stop the virus from spreading. It took five days to get the company back up and another week to get all of our systems online and another two weeks to fix everything else. In total, out of 600 total servers, we had 150 servers, including virtual machines, that were compromised.

In the end, we overcame the attack, with no data stolen (confirmed by a third-party security audit). While many organizations that fall victim to ransomware attacks opt to pay the ransom, we were able to rely on our cybersecurity defense systems that proved to be successful.

Effective IT security is a balance of culture and strategy. No matter what the level of security that is in place, there is always room for more. At some point, however, those tight measures will start to impact the user experience and possibly derail the goals of the company that are accomplished through sound IT systems.

If ransomware makes it into your organization, and based on recent statistics, there’s a good chance it will, there’s no easy way out. Downtime and added expenses are guaranteed, even in the best scenario. Without a doubt, one of the best lines of defense to protect data from cybercrime is to store copies on an electronically disconnected device. The role of tape-based offline storage offers unique advantages and cannot be underestimated in this scenario due to tape air gap. The air gap prevents cyberattacks from accessing your data since the data stored offline cannot be hacked.

Evaluating and testing your business continuity and disaster recovery plans regularly, ensuring there are multiple copies of data on multiple mediums stored in various locations, and making sure to have cybersecurity experts onboard or close at hand (as we did thanks to our ransomware insurance) will help organizations prevail over a ransomware attack in the future.

KEYWORDS: cyber security cybersecurity incident response cybersecurity preparedness ransomware

Share This Story

As Senior Director of Enterprise Business Solutions at Spectra Logic, Tony Mendoza is responsible for the entire IT infrastructure at Spectra Logic. He oversees hardware, DevOps, software and cloud system integration at the company. Mendoza also oversees the business intelligence department, which is dedicated to collecting and analyzing data to provide decisions makers within Spectra Logic with the right dashboards and tools necessary to improve processes and accelerate growth. He provides overall strategy designed to proactively deliver improved systems and services in partnership with the business. An employee with Spectra Logic for more than two decades, Mendoza’s IT expertise is often tapped for corporate webinars, product viability discussions and customer presentations. Tony has a B.S. in Business Information Systems from Regis University.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!