Build IT resilience to avoid paying ransomware demands

<p>When it comes to ransomware, it might seem like giving in and paying the ransom is the quickest fix. Luckily for today’s businesses, there is a better alternative to forking over money to cybercriminals who might not even give the data back.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p><a href=”https://www.techtarget.com/searchsecurity/definition/ransomware”>Ransomware</a> is among the most common types of cyberattacks that can strike organizations of all sizes across nearly every industry. A ransomware attack could come via any number of different attack vectors, including phishing, <a href=”https://www.techtarget.com/searchsecurity/definition/social-engineering”>social engineering</a>, or exploiting known or <a href=”https://www.techtarget.com/searchsecurity/definition/zero-day-vulnerability”>zero-day vulnerabilities</a>.</p>
<p>In a ransomware attack, the perpetrator uses malware to encrypt a user’s or organization’s data. The attacker then holds that data for ransom, demanding that the victim pay a fee to receive the decryption key.</p>
<p>All ransomware victims are faced with the same question: To pay or not to pay? Instead of considering payment, a better approach is to build up the organization’s resilience early to avoid the need to pay a future ransomware demand. A strong business continuity and disaster recovery (<a href=”https://www.techtarget.com/searchdisasterrecovery/definition/Business-Continuity-and-Disaster-Recovery-BCDR”>BCDR</a>) strategy builds the resilience that organizations need to avoid and mitigate ransomware attacks.</p>
<p>This article will discuss ransomware trends and the costs associated with <a href=”https://www.techtarget.com/searchdisasterrecovery/tip/Build-and-maintain-digital-resilience-for-a-stronger-DR-program”>bolstering resilience</a> as an alternative to payment. It will also outline the pros of a strong resilience plan vs. the cons of paying the ransom.</p>
<section class=”section main-article-chapter” data-menu-title=”Recent ransomware trends”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Recent ransomware trend

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: