Essential Strategies To Prevent Ransomware Attacks

Law enforcement crackdowns saw ransomware payments fall by more than a third from an all-time high of $1.2b (£930m) in 2023 to $813m (£650m) in 2024, figures reveal. Coordinated raids across Ukraine in 2024 also culminated in the arrest of key members of LockBit, a ransomware group that had been responsible for attacks affecting over 2,000 victims in over 70 countries, including the UK, receiving more than £90m in ransom payments

Significant progress has been made in dismantling ransomware organisations, and the reduced number of incidents are a testament to the effectiveness of law enforcement, international collaboration, and a growing refusal by victims to bow down to attacker demands. 

While the figures might indicate that we’ve narrowly dodged a ransomware extortion crisis, the biggest mistake would be to rest on our laurels, as the threat is not eliminated entirely. The ransomware ecosystem is rife with smaller players, with more emerging from the cracks. It is no surprise that JumpCloud's 2024 IT Trends research reveals over half of IT admins surveyed still rank ransomware as a top three security concerns, and rightfully so. 

Ransomware Ban: Addressing The Symptoms Or Root Cause?

The UK government’s recent proposal consultation signals a firmer stance on ransomware payment demands. According to the Home Office, proposed legislation will aim to reduce the flow of money to ransomware criminals from the UK, ultimately deterring criminals from attacking UK organisations; and increase the ability of operational agencies to disrupt and investigate ransomware actors by bolstering UK intelligence around the ransomware payment landscape. 

This is a step in the right direction and shows a real shift towards institutional change. However, ransomware is a disease. Banning pay-outs addresses the symptoms, but we need to tackle the cause and explore how technology can protect against ransomware threats before they happen.

Never Trust, Always Verify 

With ransomware attacks preying on weak security fundamentals, the best defense is a strong offense. A multi-layered Zero Trust security approach is the key for businesses. This means assuming that no user or device, whether within or beyond the organisation’s network, is inherently trustworthy. 

Some core fundamentals include requiring Multi-Factor Authentication (MFA) for every account. This way, even if credentials fall prey to attackers, there is another layer of defense in place and stolen credentials alone will not be usable. Sensitive systems should not be logged on from almost anywhere and controlled limited access based on device trust and location reduces the risk of breaches. Conditional Access Policies, whenever and wherever possible, makes sure only verified devices and users can get into company resources.

Beyond getting your data held hostage during ransomware attacks, destroyed backups can further compromise effective data recovery. Therefore, isolated backups and protection ensure the backup service is resilient to follow-up attempts to destroy backup data, malicious editing, overwriting or deleting. 

While backups are important, businesses must also make sure to thoroughly test their data recovery regime, as well as run simulated ransomware tabletop exercises to test businesses' preparedness and sharpen their response capabilities against real ransomware threats.

At the core, strong cyber hygiene across an organisation is crucial. This includes patching known vulnerabilities, regularly monitoring to identify suspicious activity early, and reducing potential entry points for attackers. 

The right defenses make all the difference. A “Never Trust, Always Verify” mindset backed by tighter access controls, automated monitoring, and cloud-based security policies can keep attackers out before they make their move. 

The Strongest Firewall Is Your Team

A chain is only as strong as its weakest link. While the technology already exists and plays a huge role in thwarting ransomware attacks, it is equally important to make sure businesses are cultivating a culture of protection. 

Employee training on phishing and social engineering can help organisations further minimise vulnerabilities and strengthen their overall ransomware defenses.  These regular training sessions should cover topics like avoiding suspicious downloads and reporting potential security incidents. Improved awareness ensures that all users are vigilant and can significantly reduce the risk of a successful ransomware attack.

While law enforcement is actively cracking down on ransomware groups and firmer legislation aims to reduce the number of attacks, ransomware threats are not slowing down. But businesses can take several steps to make it far more difficult for attackers.

By leveraging more resources and technology solutions while also nurturing a strong culture of protection within the organisation, we have the power to slow the surge of ransomware attacks globally. 

Robert Phan is Chief Information Security Officer at JumpCloud 

Image:

You Might Also Read: 

Protecting Business From The Infostealer Threat:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Manus - A Fully Autonomous Artificial Intelligence
Creating A Safe & Healthy Workplace: 10 Essential Security Measures »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

MobileIron

MobileIron

MobileIron provides EMM capabilities to IT organizations that need to secure mobile devices, applications and content.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Neptune Shield

Neptune Shield

Neptune Shield's mission is to deliver cutting edge Maritime focused Cyber Security & Threat Protection through our Hampton Roads based Tech & Cyber Security Hub.

Aurva

Aurva

Aurva are a team of engineers, product thinkers, and security minds who believe that data security should be simple, powerful, and built for speed.

Blue Networks & Infrastructure (BNI)

Blue Networks & Infrastructure (BNI)

Blue Networks and Infrastructure (BNI) is an innovative systems integrator and managed services provider.