{"id":6952,"date":"2022-10-07T16:05:12","date_gmt":"2022-10-07T15:05:12","guid":{"rendered":"https:\/\/www.conferencecall.co.uk\/blog\/?p=6952"},"modified":"2022-10-07T16:05:15","modified_gmt":"2022-10-07T15:05:15","slug":"would-you-pay-the-ransom","status":"publish","type":"post","link":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/","title":{"rendered":"Would you pay the ransom?"},"content":{"rendered":"<p>Paying the ransom is still the most common response to a ransomware attack. Although progress has been made, organisations are still paying out. Here&#8217;s more on ransomware attacks following new research from Databarracks.<br \/>\n<!--more--><\/p>\n<p>New research from Databarracks reveals 44% of organisations that suffered a ransomware attack, paid the ransom. 34% recovered from backups, while 22% used ransomware decryption tools.<\/p>\n<p>The findings come from the Databarracks 2022 Data Health Check. Running since 2008, the annual report surveys over 400 IT decision-makers in the UK on Ransomware, Cyber, Backup, Disaster Recovery and Business Continuity.<\/p>\n<p>Managing Director of Databarracks, James Watts commented: \u201cFrom the perspective of the victim, it\u2019s understandable why you might pay a ransom. You can\u2019t service customers, you can\u2019t take orders and losses quickly accumulate. The costs of downtime can quickly exceed the ransom.<\/p>\n<p>\u201cOrganisations might think that by paying the ransom it resolves the problem more quickly so they can get back to business as usual. There are several reasons why this approach is flawed.<\/p>\n<p>\u201cFirstly, there\u2019s no guarantee that you will get your data back. Secondly, it\u2019s quite common for organisations to be attacked again once criminals know they are an easy target. Lastly, it sends the wrong message. By paying, you are indirectly encouraging the criminals, showing their tactics work.<\/p>\n<p>\u201cWith the right preparation and guidance however, you can recover your data, and never have to pay the ransom.<\/p>\n<p>\u201cPatch and update systems regularly, train staff on spotting phishing emails, and maintain the principle of least privilege.<\/p>\n<p>\u201cImmutable storage and physical or logical air-gaps will protect backups from also being changed or encrypted. If you do suffer an attack, your backups are your last line of defence.<\/p>\n<p>\u201cWhen you need to recover, identify your most recent, clean recovery point and carry out isolated, sandbox recoveries. Check to make sure no further ransomware is present before starting the full restoration. Lastly, test your Disaster Recovery Plan so know the process and you are confident you can recover quickly and effectively.<\/p>\n<p>\u201cThis year\u2019s survey also showed a growing number of organisations have a policy for whether they would pay out on a ransomware attack. 68% of organisations had a policy in place, up from 54% last year. The data demonstrates an increasing awareness and better preparation for ransomware attacks.\u201d<\/p>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/3TewhGZWryg\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2>What is ransomware?<\/h2>\n<p><a href=\"https:\/\/www.conferencecall.co.uk\/blog\/ransomware-attacks-to-rise\/\">Ransomware<\/a> is a type of malicious software that\u2019s used to block you from accessing your own data. Cyber criminals use this software to encrypt the files on your system by adding extensions to the attacked data. They\u2019ll then hold this data hostage until you pay the ransom to have it released.<\/p>\n<p>Once the hackers have your data, there is no guarantee\u00a0 that your data will be given back or decrypted, even if you meet their demands. There is also no guarantee that you will not be a target a second time around. Often, once an attack is made, the hacker will sell the details on to their associates to go after the victim again.<\/p>\n<h2>What if you&#8217;re a ransomware attack victim?<\/h2>\n<p>If your business is the victim of a ransomware attack, follow these four steps:<\/p>\n<ol>\n<li><strong>Contain the breach<\/strong>\u00a0by isolating all affected devices from other computers and storage devices. You should also disconnect these devices from the internet, turn off the WiFi and disable core network connections.<\/li>\n<li><strong>Identify the breach<\/strong>\u00a0so you know how to fix it. This should become apparent from the ransom note, but you may have to investigate further. To find out where the attack originated, you could try to geo-locate the logins from the network.<\/li>\n<li><strong>Remove the malware<\/strong>\u00a0and any back doors, close ports and reset passwords.<\/li>\n<li><strong>Restore your network<\/strong>\u00a0using any backups you have.<\/li>\n<\/ol>\n<p>Once this has been done (or while it\u2019s ongoing), you should notify any affected parties. If third party data has been compromised, you\u2019ll need to inform everyone this affects. You may also need to tell your bank, and you should definitely report the incident to the police and your insurer.<\/p>\n<p style=\"line-height: 11.75pt; margin: 0cm 0cm 8.0pt 0cm;\"><span style=\"color: black;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 11.75pt; margin: 0cm 0cm 8.0pt 0cm;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">View the online report here:<\/span><\/p>\n<p style=\"line-height: 11.75pt; margin: 0cm 0cm 8.0pt 0cm;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\"><a href=\"https:\/\/protect-eu.mimecast.com\/s\/CPSBC2kJ7ukRMozC9C5aD?domain=datahealthcheck.databarracks.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/datahealthcheck.databarracks.com\/2022\/<\/a><\/span><\/p>\n<p style=\"line-height: 11.75pt; margin: 0cm 0cm 8.0pt 0cm;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Download the full report here:<\/span><\/p>\n<p style=\"line-height: 11.75pt; margin: 0cm 0cm 8.0pt 0cm;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\"><a href=\"https:\/\/protect-eu.mimecast.com\/s\/s-9CCZ6XzIMDJn9tKgWlK?domain=databarracks.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.databarracks.com\/resources\/data-health-check-2022<\/a><\/span><\/p>\n<p><a href=\"https:\/\/www.conferencecall.co.uk\/conference-call\"><img decoding=\"async\" class=\"alignnone wp-image-1777 size-full lazyloaded\" src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg\" sizes=\"(max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg 600w, https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner-300x59.jpg 300w\" alt=\"\" width=\"600\" height=\"118\" data-srcset=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg 600w, https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner-300x59.jpg 300w\" data-src=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2015\/05\/conference-call-banner.jpg\" data-sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paying the ransom is still the most common response to a ransomware attack. Although progress has been made, organisations are still paying out. Here&#8217;s more on ransomware attacks following new<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\">Read More<span class=\"screen-reader-text\">Would you pay the ransom?<\/span><\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[40,13,17],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Would you pay the ransom? - ConferenceCall.co.uk blog<\/title>\n<meta name=\"description\" content=\"Paying the ransom is still the most common response to a ransomware attack. Here&#039;s more on ransomware attacks following new research from Databarracks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Would you pay the ransom? - ConferenceCall.co.uk blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\" \/>\n<meta property=\"og:site_name\" content=\"ConferenceCall.co.uk blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-07T15:05:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-07T15:05:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2022\/10\/ransomware-2320941_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Les Roberts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LesRobertsMedia\" \/>\n<meta name=\"twitter:site\" content=\"@ConfCallUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Les Roberts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\",\"name\":\"Would you pay the ransom? - ConferenceCall.co.uk blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\"},\"datePublished\":\"2022-10-07T15:05:12+00:00\",\"dateModified\":\"2022-10-07T15:05:15+00:00\",\"author\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b\"},\"description\":\"Paying the ransom is still the most common response to a ransomware attack. Here's more on ransomware attacks following new research from Databarracks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.conferencecall.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Would you pay the ransom?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#website\",\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/\",\"name\":\"ConferenceCall.co.uk blog\",\"description\":\"Conference calling made easy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b\",\"name\":\"Les Roberts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g\",\"caption\":\"Les Roberts\"},\"sameAs\":[\"https:\/\/twitter.com\/LesRobertsMedia\"],\"url\":\"https:\/\/www.conferencecall.co.uk\/blog\/author\/les\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Would you pay the ransom? - ConferenceCall.co.uk blog","description":"Paying the ransom is still the most common response to a ransomware attack. Here's more on ransomware attacks following new research from Databarracks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/","og_locale":"en_GB","og_type":"article","og_title":"Would you pay the ransom? - ConferenceCall.co.uk blog","og_url":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/","og_site_name":"ConferenceCall.co.uk blog","article_publisher":"https:\/\/www.facebook.com\/pages\/Conference-Call-UK\/178511498997826","article_published_time":"2022-10-07T15:05:12+00:00","article_modified_time":"2022-10-07T15:05:15+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.conferencecall.co.uk\/blog\/wp-content\/uploads\/2022\/10\/ransomware-2320941_1280.jpg","type":"image\/jpeg"}],"author":"Les Roberts","twitter_card":"summary_large_image","twitter_creator":"@LesRobertsMedia","twitter_site":"@ConfCallUK","twitter_misc":{"Written by":"Les Roberts","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/","url":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/","name":"Would you pay the ransom? - ConferenceCall.co.uk blog","isPartOf":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website"},"datePublished":"2022-10-07T15:05:12+00:00","dateModified":"2022-10-07T15:05:15+00:00","author":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b"},"description":"Paying the ransom is still the most common response to a ransomware attack. Here's more on ransomware attacks following new research from Databarracks.","breadcrumb":{"@id":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.conferencecall.co.uk\/blog\/would-you-pay-the-ransom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.conferencecall.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"Would you pay the ransom?"}]},{"@type":"WebSite","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#website","url":"https:\/\/www.conferencecall.co.uk\/blog\/","name":"ConferenceCall.co.uk blog","description":"Conference calling made easy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.conferencecall.co.uk\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/fd51b09e17d75360ba18197c2c1c535b","name":"Les Roberts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.conferencecall.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d887807fb3eaf5e8705c4d4f1328df3e?s=96&d=mm&r=g","caption":"Les Roberts"},"sameAs":["https:\/\/twitter.com\/LesRobertsMedia"],"url":"https:\/\/www.conferencecall.co.uk\/blog\/author\/les\/"}]}},"_links":{"self":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6952"}],"collection":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6952"}],"version-history":[{"count":1,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6952\/revisions"}],"predecessor-version":[{"id":6954,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6952\/revisions\/6954"}],"wp:attachment":[{"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.conferencecall.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}