Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Problem

The likelihood that an organisation will face a ransomware incident is extremely high. Despite implementing security controls to reduce risk, it is realistic to assume that, at some point, you will need to deal with the impact of ransomware and the challenge of restoring your systems and data.

Solution

Ransomware is a form of malicious software that prevents access to information or systems. This may involve locking devices, encrypting data, or even exfiltrating and deleting sensitive information.

A well-known example is the WannaCry ransomware attack, during which many large organisations worldwide experienced severe operational disruption.

Modern organisations depend heavily on technology and software. Without functioning information systems, most businesses cannot operate effectively.

Mitigating ransomware risk can become costly—particularly if preventive measures are weak or absent. It is important to be clear: there is no single software solution that can fully prevent ransomware incidents. Any claim suggesting complete protection is misleading. Ransomware is sophisticated and continually evolving, developed by highly capable adversaries. This makes it a complex problem without a simple technical fix.

The most effective and practical approach focuses on resilience:

Testing recovery procedures and validating offline backups are essential. These measures represent one of the simplest and most cost-effective ways to improve resilience against ransomware.

Establishing a sound backup strategy is not complex, but it does require discipline and consistency. It is routine work that must be carried out diligently.

Ensure that, in addition to online backups, secure offline backups are maintained—physically or logically separated from the network. Backups that remain connected to the network may also be compromised or encrypted during an attack. Reliance solely on cloud-based backups is not sufficient; they should form part of a broader, well-considered backup strategy.

For further information: