Ransomware outbreaks dominated cybersecurity headlines throughout 2017, with thousands of companies, big and small, being affected and paying hundreds to thousands of dollars to faceless attackers. Ransomware infects computer systems through various means, much like other malware scripts, and will encrypt data from individual computers or entire networks. Usually, companies are confronted with a message and instructions to pay the attackers a set amount, usually in the form of cryptocurrency like Bitcoin. The worst part is that, in many cases, businesses that paid up were either attacked again or could never recover their data.
The reality with ransomware is that you can’t trust the attackers to keep their word. They have no incentive to let you off the hook just for paying the ransom. Never receiving the decryption key to your files is a common outcome of paying ransomware fees, since the attackers only ever intended to take your money and run. The other outcome is that you receive the decryption key after paying, but make no mistake, paying the ransom paints a big target on your back. Even after upgrading and improving your security immediately after an attack, you’ll be under siege by attackers who now know you as an entity that’s willing to pay.
Commonly, companies will pay the ransom because the fee is inexpensive compared to what the downtime or loss of their system would cost them. Other times, companies pay the ransom to avoid public embarrassment and sweep the incident under the rug. While it’s highly unrecommended, the decision of whether to pay the ransom isn’t a black-and-white issue, and many businesses may be in a position where they have no choice but to pay.
However, even considering to pay the ransom should be the last resort. It’s up to company leadership to run a risk management plan that Read More Here