Anti-Ransomware Day 2025

Ransomware is no longer just a nuisance – it has evolved into a strategic, headline-grabbing threat. UK businesses are now losing an estimated £64 billion annually to cyber-attacks, attributed to ransom payments, downtime, and lost revenue.

The barrier to entry has dropped significantly, with ransomware-as-a-service making sophisticated attacks accessible even to low-skilled criminals.

AI is working as a superpower for threat actors, enabling them to generate convincing phishing emails and adaptive malware that evades detection. Even more alarming is the rise of agentic AI – autonomous systems capable of evolving ransomware independently, accelerating both the speed and sophistication of attacks.

With incidents up 126% in the first quarter of 2025 alone, Anti-Ransomware Day highlights the urgent need for cyber resilience as a long-term, proactive strategy.

A Proactive, Not Reactive, Approach

A proactive mindset is key to preventing cyber-attacks, and being prepared for them is essential. Darren Thomson, Field CTO EMEAI at Commvault, notes that recovery takes 24 days on average, but in some cases, organisations don't resume normal operations for over 200 days. This is “often due to poor preparation and a lack of understanding of their “Minimum Viable Company” – the essential systems needed to stay operational.” Knowing your MVC is the foundation of resilience. Without it, you're flying blind when disaster strikes.

Glenn Akester, Technology Director for Cyber Security & Networks at Node4 stresses that cyber resilience is also dependent on getting the basics right - strong patching policies, endpoint protection, access controls, and real-time monitoring. “It’s not about adding more tools,” he says, “but making sure existing ones are well managed and focused on reducing risk rather than ticking compliance boxes.”

But even with strong tools, backups remain the last line of defence. Akester points out that these are increasingly under attack themselves. “Backups must be secure by design – immutable, segregated from live systems, and regularly tested. A backup that fails under pressure isn’t really a backup at all.”

Thomson highlights the role of cleanroom environments to ensure these backups remain secure: “by restoring critical cloud services in a secure, isolated space and using automation to speed up recovery, companies can minimise downtime.” These environments, combined with automation, can significantly reduce the recovery time following an attack.

Extending your protections through the entire supply chain is also a non-negotiable. Andy Swift, Cyber Security Assurance Technical Director at Six Degrees, urges organisations to adopt “zero trust principles, least privilege access, and strong boundary controls with all suppliers and partners.” Attackers often target weak points in seemingly robust security systems, so having full visibility and understanding of these is essential.

Making Cybersecurity Everyone’s Responsibility

Cyber-attacks are often mistaken as a “victimless crime” but are actually far from this. Thomson reminds us that “individuals must also take responsibility for their cybersecurity.” As recently witnessed by Spain and Portugal, society is becoming increasingly dependent on technology to survive. “Consumers should start by evaluating their own Minimum Viable Company: Could you manage without internet access? Do you have a backup plan if payment terminals go down?”

Cyber resilience is no longer just a concern for businesses. When an organisation is breached, whose data is usually compromised? Thomson stresses that “practical steps like using secure password managers, avoiding password reuse, and steering clear of public Wi-Fi without a VPN” all work to protect individuals.

From a business perspective, cyber resilience must run through the entire organisation – from the C-suite down to individual employees. Shobhit Gautam, Staff Solutions Architect, EMEA at HackerOne, emphasises the growing risk to sectors like healthcare, retail, and manufacturing. Gautam attributes this to their “growing reliance on digital systems” along with increased use of “third-party components and inadequately protected legacy systems.” He advocates for crowdsourced security measures and bug bounty programmes to identify vulnerabilities before attackers do.

Akester notes with concern that cybersecurity ranks only seventh among strategic priorities for many business leaders, while protection from ransomware doesn’t place in the top ten. Cybersecurity follows a trickle-down approach: when the C-suite prioritise it, so will the wider organisation.

A Moment To Pause, Not Panic

A ransomware attack is not a distant threat or a one-off incident – it’s an inevitability. With threats becoming more sophisticated than ever and AI supercharging these, organisations can no longer rely on hope or outdated policies. As Akester concludes, “resilience can’t be assumed, it needs to be designed, tested, and maintained.”

This Anti-Ransomware Day is a moment to pause, not panic. It’s an opportunity to reframe resilience as a priority for every person, department, and supplier. Whether you’re a CEO reviewing investment priorities or an employee rethinking your digital hygiene, the message is clear: cybersecurity is no longer someone else’s problem.

Image: Ideogram

You Might Also Read: 

Essential Strategies To Prevent Ransomware Attacks:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Iranian Hackers Attacking Critical Infrastructure

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Sure Valley Ventures

Sure Valley Ventures

Sure Valley Ventures is an entrepreneur led venture capital fund focused on helping software entrepreneurs grow and scale businesses that will have a global impact.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.