Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Reduce the Risks of Ransomware
Cybersecurity

How to Reduce the Risks of Ransomware

Chris HughesBy Chris HughesMarch 29, 20223 Mins Read
Facebook Twitter LinkedIn Email
Ransomware
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Ransomware continues to take the world by storm, becoming one of, if not the most prevalent attack methods implemented by malicious actors. Some key statistics around Ransomware include a worldwide cost of $20 billion in 2021, and potentially up to $265 billion by 2031. Ransomware has also impacted 37% of all businesses and organizations in 2021 and on average includes recovery costs of nearly $2 million.

For those unfamiliar, Ransomware is an attack where organizational data is encrypted and payment demanded for its decryption. It can occur through numerous methods, such as malicious files, links, system vulnerabilities, and more. It can be incredibly disruptive not just financially but also operationally. An attack can grind an organization’s operations to a halt.

While the rapid growth of Ransomware is daunting, guidance is available to deal with the problem. Many organizations, including NIST, CISA, FBI, and others, offer recommendations, tips, best practices, and other collateral to deal with Ransomware. Notably, the NIST provides very concise and actionable recommendations to prevent Ransomware as well as how to recover should you fall victim to it.

What’s more, the NIST offers fundamental cybersecurity best practices that many organizations should be following already, such as utilizing antivirus software, keeping systems patched, blocking access to known malicious sites, and more. However, there are also additional actions, such as minimizing the use of overly permissive access controls, which ironically enough aligns with the broader push for Zero Trust, and also educating users on their activities.

Since Ransomware often enters an organization through users’ activities such as clicking on malicious files or links from unknown sources, educating your workforce is a critical step to take on your journey to mitigating your Ransomware risk as well.

All of that said, incidents can and will happen and you need to be prepared to respond to them when they do occur. Organizations should develop an incident response and business continuity plan and actually test it, even going so far as to run cutover exercises, moving beyond hypothetical scenarios. Given that Ransomware targets data and its associated storage, organizations must have backup and restoration plans that they regularly test as well.

Many organizations both in the public and private sectors have adopted frameworks, such as NIST’s Cybersecurity Framework. NIST also produced a Ransomware profile as part of the CSF effort, which helps organizations both gauge their existing readiness against Ransomware attacks but also improvise to mitigate the risks and ultimately recover from it if necessary too.

From a high level, the focus should revolve around educating employees, hardening systems from vulnerabilities and exploitation, and being able to quickly detect and respond to infections if they occur.

There are also undeniable parallels between the guidance from NIST around Ransomware and that of CISA in their “Shields Up” campaign as well, which aims to help organizations prepare for and respond to cyberattacks if they occur. The reason for this similarity is that malicious actors often take the path of least resistance. That means taking advantage of fundamental cybersecurity oversights such as insecure systems, poor workforce cybersecurity practices, and often simple administrative system oversights.

If you’re looking for more information on Ransomware, how devastating it is, and how to prepare and respond to it, the “Stop Ransomware” page from CISA is among the best resources. It includes a Newsroom, Alerts, Fact Sheets, and Ransomware Guidance, including best practices.

With the dramatically increasing rates of Ransomware paralyzing organizations’ operations and wreaking financial havoc across the global economy, it is critical for organizations to pay attention to this guidance and prepare accordingly.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity Cybersecurity channel featured Ransomware risk
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Google’s Vision for Gemini Super Assistant, Universal Capabilities

May 30, 2025

Accelerate, Assist, Transform: A Framework for AI Adoption Success

May 30, 2025

Google Offers First-of-Its-Kind GenAI Certification for Managers

May 30, 2025

Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse

May 29, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google’s Vision for Gemini Super Assistant, Universal Capabilities
  • Accelerate, Assist, Transform: A Framework for AI Adoption Success
  • Google Offers First-of-Its-Kind GenAI Certification for Managers
  • Marc Benioff Is Transforming World’s Largest Apps Vendor into AI-Data Powerhouse
  • AI Agents Are Here: Why C-Suite Leaders Should Pay Attention Now

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.