Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » 5 Steps to Protect Your Organization from Ransomware Attacks
Cybersecurity

5 Steps to Protect Your Organization from Ransomware Attacks

Robert WoodBy Robert WoodJanuary 5, 2022Updated:July 27, 20224 Mins Read
Facebook Twitter LinkedIn Email
Ransomware 2021
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Ransomware has captured the attention of media, security professionals, legislators, and the general population. As an attack technique, ransomware tracks back to Harvard-trained biologist Joseph Popp in 1989. Ransomware has evolved significantly over the years, and it has spun off entire cottage industries on both the attacker and defender side of the issue.

In 2021, there were multiple high-profile ransomware attacks that led to significant socio-economic disruption, notably the JBS USA meat supplier and Colonial Pipeline attacks. These particular attacks didn’t just disrupt one organization’s internal operations. They were part of broader supply chains that impacted other organizations that are part of a critical sector.

There are 16 critical sectors as defined by the Cybersecurity and Infrastructure Security Agency. Attacks across these sectors have the potential to be enormously disruptive, because they involve organizations that are part of a broader, multi-dimensional supply chain, with the possibility of intense ripple effects.

More complex IT supply chains for organizations beyond critical sector reliance also opens up more opportunities for criminal groups. The Kayesa attack highlighted the opportunity for network effects to occur through service provider-to-consumer relationships.

Ransomware is unique as an attack vector because it is likely to not just result in data loss or theft, but actively disrupt operations. This disruption is often core to an organization’s mission, value stream, and profit center; that’s why it’s a lucrative attack vector. A collection of statistics from ThreatPost supports this, highlighting steady growth in the frequency of ransomware attacks.

Risk Is Rising

The typical means of risk assessment—a derivative calculation of impact and likelihood—tells us that the risk is rising. I recently explored the evolving tactics of ransomware groups and how the pace of innovation is leading to advancing sophistication. All of this, coupled with a lower barrier of entry, drive the likelihood of attacks higher. The continued push for digital projects and the reliance on IT for more facets of our lives increase the impact in the event of a successful attack.

A recent report by Crowdstrike also highlights a significant increase in the adoption of ransomware as a tool in e-crime. While criminal organizations continue to embrace ransomware, their techniques are evolving. This includes:

  • Process techniques such as outsourcing to distribute risk and increase scale
  • Technical techniques enhancing security tool obfuscation
  • Industry and scenario targeting

An example of an evolution in industry and scenario targeting is the reaction to the global Covid-19 pandemic. Malware or intrusion campaigns are leveraging Covid-19 themes to target organizations generally or targeting healthcare organizations involved in the global or community response. This particular Covid-19 scenario invites a visceral emotional response from people given how it has impacted the world. Criminals understand this, which is why global current events can and often are used against people.

The Right Tools and Practices

Here are five things that organizations can do to help improve their own risk posture against ransomware:

  1. Invest in asset management, devices, identities, services, software, etc. This is a basic practice in IT and security but you can’t protect what you can’t see.
  2. Define and practice an incident response plan that is inclusive of ransomware readiness. Test your communications, test your quarantine and containment, test your detection plans.
  3. Embrace a posture of least privilege and multi-factor authentication across the organization.
  4. Ensure that key resources are regularly backed up, with restores being regularly tested to ensure they work as expected when they’re needed.
  5. Think through and “red team” ransomware scenarios using attack and defense trees to visualize and model the paths an adversary might take. This process can be done starting at the edge (or point of entry) or working backwards from a critical asset.

The challenges presented to organizations on account of ransomware demand response—and action. Organizations cannot manage risk in a vacuum because of our global interconnected state.

featured Ransomware security
Share. Facebook Twitter LinkedIn Email
Robert Wood

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

Related Posts

PwC Updates AI Agent Orchestrator With Support for AWS-Native Services

July 25, 2025

SAP Q2 Results: The Good News, and the Not-As-Good News

July 24, 2025

SAP Still #1 in Apps Growth, but Big Backlog Slowdown

July 24, 2025

U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers

July 23, 2025
Add A Comment

Comments are closed.

Recent Posts
  • PwC Updates AI Agent Orchestrator With Support for AWS-Native Services
  • SAP Q2 Results: The Good News, and the Not-As-Good News
  • SAP Still #1 in Apps Growth, but Big Backlog Slowdown
  • U.K. Government Partners with Google Cloud to Modernize Infrastructure and Upskill 100,000 Workers
  • Thailand Turns to Microsoft Azure AI for Legal System Overhaul

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Special Report: Cloud Wars 2025 CEO Outlook

February 12, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }