Anti-Ransomware Day 2025

Ransomware is no longer just a nuisance – it has evolved into a strategic, headline-grabbing threat. UK businesses are now losing an estimated £64 billion annually to cyber-attacks, attributed to ransom payments, downtime, and lost revenue.

The barrier to entry has dropped significantly, with ransomware-as-a-service making sophisticated attacks accessible even to low-skilled criminals.

AI is working as a superpower for threat actors, enabling them to generate convincing phishing emails and adaptive malware that evades detection. Even more alarming is the rise of agentic AI – autonomous systems capable of evolving ransomware independently, accelerating both the speed and sophistication of attacks.

With incidents up 126% in the first quarter of 2025 alone, Anti-Ransomware Day highlights the urgent need for cyber resilience as a long-term, proactive strategy.

A Proactive, Not Reactive, Approach

A proactive mindset is key to preventing cyber-attacks, and being prepared for them is essential. Darren Thomson, Field CTO EMEAI at Commvault, notes that recovery takes 24 days on average, but in some cases, organisations don't resume normal operations for over 200 days. This is “often due to poor preparation and a lack of understanding of their “Minimum Viable Company” – the essential systems needed to stay operational.” Knowing your MVC is the foundation of resilience. Without it, you're flying blind when disaster strikes.

Glenn Akester, Technology Director for Cyber Security & Networks at Node4 stresses that cyber resilience is also dependent on getting the basics right - strong patching policies, endpoint protection, access controls, and real-time monitoring. “It’s not about adding more tools,” he says, “but making sure existing ones are well managed and focused on reducing risk rather than ticking compliance boxes.”

But even with strong tools, backups remain the last line of defence. Akester points out that these are increasingly under attack themselves. “Backups must be secure by design – immutable, segregated from live systems, and regularly tested. A backup that fails under pressure isn’t really a backup at all.”

Thomson highlights the role of cleanroom environments to ensure these backups remain secure: “by restoring critical cloud services in a secure, isolated space and using automation to speed up recovery, companies can minimise downtime.” These environments, combined with automation, can significantly reduce the recovery time following an attack.

Extending your protections through the entire supply chain is also a non-negotiable. Andy Swift, Cyber Security Assurance Technical Director at Six Degrees, urges organisations to adopt “zero trust principles, least privilege access, and strong boundary controls with all suppliers and partners.” Attackers often target weak points in seemingly robust security systems, so having full visibility and understanding of these is essential.

Making Cybersecurity Everyone’s Responsibility

Cyber-attacks are often mistaken as a “victimless crime” but are actually far from this. Thomson reminds us that “individuals must also take responsibility for their cybersecurity.” As recently witnessed by Spain and Portugal, society is becoming increasingly dependent on technology to survive. “Consumers should start by evaluating their own Minimum Viable Company: Could you manage without internet access? Do you have a backup plan if payment terminals go down?”

Cyber resilience is no longer just a concern for businesses. When an organisation is breached, whose data is usually compromised? Thomson stresses that “practical steps like using secure password managers, avoiding password reuse, and steering clear of public Wi-Fi without a VPN” all work to protect individuals.

From a business perspective, cyber resilience must run through the entire organisation – from the C-suite down to individual employees. Shobhit Gautam, Staff Solutions Architect, EMEA at HackerOne, emphasises the growing risk to sectors like healthcare, retail, and manufacturing. Gautam attributes this to their “growing reliance on digital systems” along with increased use of “third-party components and inadequately protected legacy systems.” He advocates for crowdsourced security measures and bug bounty programmes to identify vulnerabilities before attackers do.

Akester notes with concern that cybersecurity ranks only seventh among strategic priorities for many business leaders, while protection from ransomware doesn’t place in the top ten. Cybersecurity follows a trickle-down approach: when the C-suite prioritise it, so will the wider organisation.

A Moment To Pause, Not Panic

A ransomware attack is not a distant threat or a one-off incident – it’s an inevitability. With threats becoming more sophisticated than ever and AI supercharging these, organisations can no longer rely on hope or outdated policies. As Akester concludes, “resilience can’t be assumed, it needs to be designed, tested, and maintained.”

This Anti-Ransomware Day is a moment to pause, not panic. It’s an opportunity to reframe resilience as a priority for every person, department, and supplier. Whether you’re a CEO reviewing investment priorities or an employee rethinking your digital hygiene, the message is clear: cybersecurity is no longer someone else’s problem.

Image: Ideogram

You Might Also Read: 

Essential Strategies To Prevent Ransomware Attacks:


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 


 

« Iranian Hackers Attacking Critical Infrastructure
Some Organisations Think It's Wrong To Use AI To Cut Headcount »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

Pillar Security

Pillar Security

Pillar Security are building the unified AI security platform to identify, assess, and mitigate security risks across your entire AI lifecycle.