Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » The CFO’s Guide to Ransomware Risk Mitigation
Cybersecurity

The CFO’s Guide to Ransomware Risk Mitigation

Frank OhlhorstBy Frank OhlhorstOctober 13, 2021Updated:April 13, 20236 Mins Read
Facebook Twitter LinkedIn Email
Preventing ransomware as a service (RaaS) from infecting a computer that is locked down
Share
Facebook Twitter LinkedIn Email

There was a time not so long ago when CFOs only had to worry about budgets and finances. However, CFOs are finding that their sphere of influence is expanding. Now, they have to work with other C-level executives and their teams to build the business of the future. Take for example cybersecurity, a process once left to the CIO or CISO, or even to the IT team. However, the threats have evolved and changed against businesses. This means those preparing for The Future Office of the CFO have to be aware of the potential disruption to the business caused by a cyberattack. Nowhere is this more true than with ransomware. It can impact all levels of a business, disrupt supply chains, and lead to unexpected financial liabilities.  

Ransomware: The Beginning

Ransomware attacks are on the rise. It seems that more and more organizations fall victim on a daily basis. Unfortunately, ransomware attacks are not a new phenomenon. The concept of digital extortion has been around for some time. One of the first documented ransomware attacks came along in the late 1980s. It began with using floppy disks to infect systems with the PC Cyborg Virus, also known as the AIDS Trojan Virus.

The late biologist, Joseph Popp created the AIDs Trojan virus. The virus was distributed via floppy disks labeled “AIDS Information – Introductory Diskettes.” Around 20,000 infected disks were distributed to attendees of the World Health Organization’s AIDS conference. The virus worked by hiding directories and encrypting files on the PC’s hard drive. Then, it displayed a message requiring those infected to send $189 to a Panamanian PO Box used by the PC Cyborg Corporation to get the key to unlock the computer’s data files.

Tipped off by the British anti-virus industry, New Scotland Yard issued an arrest warrant for Dr. Popp. He faced charges of 11 counts of blackmail. They quickly analyzed the virus. Software tools were made available to restore data on infected systems. Some 32 years later, ransomware remains a major problem.

The Growth of Ransomware

Ransomware has evolved significantly over the last 32 years. It has become a worldwide scourge, with costs expected to reach some $20 billion in 2021, according to Cybersecurity Ventures. However, that number only represents the amount of ransom expected to be paid out. The overall costs are most likely much higher. There are costs for remediation, cybersecurity software meant to prevent ransomware, and loss of productivity. There’s also a potential cost associated with damage to an organization’s brand and reputation. Those costs can add up, especially when one considers the average attack costs some $200,000 according to the National Security Institute.

Many different factors have contributed to the growth of the ransomware phenomenon. For example, the growth has stemmed from how easily it can be distributed. Additionally, the rise of cryptocurrencies, such as bitcoin, has contributed to the spread of ransomware. This makes it impossible to track down those demanding ransoms.

Furthermore, ransomware has become a big business for organized cybercrime. With the availability of Ransomware as a Service (RaaS), developers can sell or lease compact, easily deployable, and scalable malware toolkits to individuals and groups who want to stage cyberattacks. That means anyone who has access to the dark web can buy a ransomware kit and deploy it for quick and easy profit.

Ransomware Today

Now, more than just cybercriminal organizations can get into the extortion game. Businesses and organizations may have to start worrying about disgruntled employees or others planting ransomware from the inside of the network. A scary thought for those already dealing with insider threats.

Today, an attack seems inevitable for almost any organization. After all, the news often mentions a large organization falling prey to a ransomware attack. It covers how those organizations have to pay the ransom to quickly get their data back. Many of those headlines mention ransoms of millions of dollars, as well as other threats posed by cybercriminals.

Understand How it Spreads

For example, some cybercriminals not only threaten to leave files inaccessible but also threaten to reveal company secrets they gathered as part of a ransomware attack if they don’t pay a ransom quickly. Other cybercriminals escalate the amount of ransom demanded as time goes on. Simply put, ransomware is no longer something that we can ignore, with businesses relying on luck or some sense of security to protect them. However, all is not lost. Businesses can protect themselves from ransomware by understanding how infections can happen and what steps to take to keep the ransomware threat at bay.

There are numerous vectors making computers vulnerable to an attack. One of the most common attack vectors comes in the form of phishing, where an attacker uses an email attachment to target the victim. That attachment usually masquerades as a trusted file, perhaps a document, spreadsheet, or some other common file type used by the victim. The idea here is that the victim accesses the file, which then launches a payload to infect the computer. From there, the malicious code goes to work in the background exploiting security holes or using other tricks to gain access.

Intruders are those who hack their way into an organization’s network to gain access to a critical system. Intruders launch some of these ransomware attacks. Those intruders leverage security flaws, attempt to take over accounts, or look for unpatched systems to break into a network. Another attack vector comes in the form of malicious code delivered by a website, referred to as a “drive-by-download”. A visit to a website can result in inadvertently downloading a malicious code that the browser then executes.

Preventing Infections and Attacks

Keeping ransomware at bay may seem like a herculean task. However, those who are armed with basic knowledge of cybersecurity can become part of the solution. Adopting some basic best practices can go a long way in helping secure the network and prevent ransomware attacks.

  • Staff: It is critical to train the employees of an organization about cyber hygiene. Any employee, partner, supplier, or vendor that connects to the network must be educated about cyberthreats. That means providing measurable cybersecurity awareness training. With the majority of ransomware attacks coming through via phishing or social engineering tactics, properly educated people can help defend the network.
  • Technology: Deploying a layered defense protects data, endpoints, gateways, and hosts. It also offers defense from multiple attack vectors.
  • Process: Creating a risk management plan becomes critical to prevent attacks. In addition, policies and rules to control access to systems, data, applications, and devices are also essential in threat prevention.
  • Protection: Regular backups, which you can protect from attacks, prove to be a remediation path if an attack occurs.
  • Knowledge: By working with other departments, you can better understand how they use data throughout the organization as well as protection methods.

In today’s world, cybersecurity is no longer limited to the IT department. Effective cybersecurity requires that everyone in the organization participates, from the C suite on down.

Ransomware
Share. Facebook Twitter LinkedIn Email
Frank Ohlhorst
  • Tumblr
  • LinkedIn

Frank Ohlhorst is Editor-in-Chief and Analyst for Acceleration Economy focusing on IT Strategy and Security. He is an information technology industry analyst and award-winning technology journalist, with extensive experience as a business consultant, editor, author, and blogger. Frank contributes to several leading technology publications and has contributed to eWeek, Enterprise Security Planet, Enterprise Networking Planet, CIO.COM, Desktop Engineering Magazine, SDTimes, IDG, Techrepublic, Peerlyst and numerous other publications. Frank also moderates roundtables at industry events, presents at industry events and helps organize industry events.

Related Posts

AI Agent & Copilot Podcast: Kyndryl AI Readiness Report Finds People, Orgs Have a Steep Hill to Climb

June 11, 2025

IBM Invests in NYC AI Ecosystem with Cutting-Edge Developer Hub

June 11, 2025

AI Agent & Copilot Podcast: Security, Microsoft Copilot Partnership Insights from Zenity’s Michael Bargury

June 4, 2025

AI Agent & Copilot Podcast: St. Luke’s University Health Network On Expanding AI Use Cases

May 20, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization
  • Workday Sets the Standard for Responsible AI with Dual Governance Accreditations
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.